-
Notifications
You must be signed in to change notification settings - Fork 1.5k
Multiple bug fixes and doc enhancements #1200
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
unusedServiceTGARNs := currentServiceTGARNs.Difference(usedServiceTGARNs) | ||
for arn := range unusedServiceTGARNs { | ||
if usedExternalTGARNs.Has(arn) { | ||
albctx.GetEventf(ctx)(corev1.EventTypeWarning, "Warning", "targetGroup created for k8s service should be referenced by serviceName and servicePort instead of TargetGroupARN: %s", arn) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is this something that is actionable, though? The message above doesn't seem to explain why this is a warning.
Maybe this should just be an INFO-level log message and perhaps change the message to something like "Ignoring targetGroup XXX during garbage collection because targetGroupARN is set, indicating it was not created by ALB Ingress Controller."?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hi, jay, yes. This action is actionable. We issue this warning because we detected the targetGroup is created by the controller(based on tags), but user used ARN to reference it, which they shouldn't since we won't bind targets into it and won't manage the lifecycle.
It's stated in docs as well https://kubernetes-sigs.github.io/aws-alb-ingress-controller/guide/ingress/annotation/#actions "use ARN in forward Action".
/approve |
@SaranBalaji90: changing LGTM is restricted to collaborators In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: M00nF1sh, SaranBalaji90 The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Multiple bug fixes and doc enhancements
The PR is separated into 6 independent commit: (review each one individually by click on "Commits" tab.
fix default action comparison
: Fix When running by target-type:ip on EKS, ingress targetgroup changes occur due to the increase or decrease of unrelated nodes ASG #1163 .The default action from ALB contains both targetGroupARN in top level Action structure, and also contain targetGroupARN in forwardAction structure. While desiredAction build only contains it in forwardAction structure. Use dedicated compare method instead of deepEqual to avoid unnecessary modification.
issue warning when an targetGroup for k8s service is referenced by ARN
: Fix Advanced routing option gives: failed to GC targetGroups due to failed to delete targetGroup due to ResourceInUse #1140There are users used TargetGroupArn in action configuration even if the targetGroup is created for a k8s service by controller. The controller will try to delete that targetGroup(though the deletion will fail due to dependencies).
This commit will issue a warning to user and bypass deletion under such misusage.
various docs enhancements
: close Multiple separate rules with the same target group #1150, close Document HTTPS requirement for Cognito/OIDC authentication #1149conditions
annotation is supported for both normal serviceName and annotation based action name.make docs-serve
andmake docs-deploy
by install dependencies first.set default log level to be 2 for more verbose message
: sets default log level to 2, which will emit "successfully reconciled" message from controller-runtime, which is useful for most ppl.make subnet resolve message more clear
: make the subnet tagging requirement message more clear:bug fix for pod readiness gate
: capture 2 edge case that is not captured in original podReadinessGate PR