Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Avoid unnecessary backend service update in NEG linker #1162

Merged
merged 1 commit into from
Jun 19, 2020

Conversation

skmatti
Copy link
Contributor

@skmatti skmatti commented Jun 18, 2020

No description provided.

@k8s-ci-robot k8s-ci-robot added the cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. label Jun 18, 2020
@k8s-ci-robot
Copy link
Contributor

Hi @skmatti. Thanks for your PR.

I'm waiting for a kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@k8s-ci-robot k8s-ci-robot added needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. size/M Denotes a PR that changes 30-99 lines, ignoring generated files. labels Jun 18, 2020
pkg/backends/neg_linker.go Outdated Show resolved Hide resolved
Copy link
Contributor

@freehan freehan left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I do not think this PR is needed as this is included in the composite NEG type

neg, err := l.negGetter.GetNetworkEndpointGroup(negName, group.Zone, utils.GetAPIVersionFromServicePort(&sp))

@k8s-ci-robot k8s-ci-robot added size/S Denotes a PR that changes 10-29 lines, ignoring generated files. and removed size/M Denotes a PR that changes 30-99 lines, ignoring generated files. labels Jun 18, 2020
@skmatti
Copy link
Contributor Author

skmatti commented Jun 18, 2020

I do not think this PR is needed.

The issue still exists as the utility function does not consider beta features

func GetAPIVersionFromServicePort(sp *ServicePort) meta.Version {
if sp.VMIPNEGEnabled {
// this uses VM_IP NEGS which requires alpha API
return meta.VersionAlpha
}
return meta.VersionGA

@freehan
Copy link
Contributor

freehan commented Jun 18, 2020

/ok-to-test

@k8s-ci-robot k8s-ci-robot added ok-to-test Indicates a non-member PR verified by an org member that is safe to test. and removed needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. labels Jun 18, 2020
@freehan
Copy link
Contributor

freehan commented Jun 18, 2020

LGTM from my side.

I will let @prameshj to take a final look

@prameshj
Copy link
Contributor

The change looks good to me. But I am not sure how we are avoiding an unnecessary update here. I see version lookup unified and extra logging added.

@freehan
Copy link
Contributor

freehan commented Jun 19, 2020

There is an api version section in the self link.

When you get backend-service with beta API, the selfLink of its backends all contain beta. Same for NEG selfLink. So for example, when you have beta feature enabled on backend-service. NegLinker will use beta API to get backend-service and use alpha or v1 API to get NEG. Then the NEG selfLink is always different because the API version section is different. Hence the negLinker will always try to update the backend service on every sync even though it is a noop.

@freehan
Copy link
Contributor

freehan commented Jun 19, 2020

/lgtm
/approve

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Jun 19, 2020
@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: freehan, skmatti

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Jun 19, 2020
@k8s-ci-robot k8s-ci-robot merged commit e33650b into kubernetes:master Jun 19, 2020
@bowei
Copy link
Member

bowei commented Jun 19, 2020

Stuff like this needs to go into the commit message.

Otherwise people reading the code later will have no idea that this is why the change was made.

There is an api version section in the self link.

When you get backend-service with beta API, the selfLink of its backends all contain beta. Same for NEG selfLink. So for example, when you have beta feature enabled on backend-service. NegLinker will use beta API to get backend-service and use alpha or v1 API to get NEG. Then the NEG selfLink is always different because the API version section is different. Hence the negLinker will always try to update the backend service on every sync even though it is a noop.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. lgtm "Looks good to me", indicates that a PR is ready to be merged. ok-to-test Indicates a non-member PR verified by an org member that is safe to test. size/S Denotes a PR that changes 10-29 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants