-
Notifications
You must be signed in to change notification settings - Fork 2.2k
Increase timeout waitForCertificateRequestToExist #5485
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Increase timeout waitForCertificateRequestToExist #5485
Conversation
- We were finding that when the apiserver is slow to respond that we would sometimes receive the error: 'multiple CertificateRequests were found for the 'next' revision 1, issuance is skipped until there are no more duplicates'. The hope is that by increasing the timeout here, we are less likely to see this issue crop up. Signed-off-by: Cody W. Eilar <ecody@vmware.com>
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: AcidLeroy The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Hi @AcidLeroy. Thanks for your PR. I'm waiting for a cert-manager member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/assign @munnerz |
@AcidLeroy I think the new feature gate should be enough, especially given that we assume that this is an edge case. Do you foresee any issues (i.e for enabling an alpha feature gate in your environments)? |
@irbekrm I don't see us having any problems with the feature gates. Our usage of cert-manager in our production systems is pretty basic, and I'm fairly certain no one is doing any fancy testing around generated certificate names. If they had, they probably would have found the duplicate certificate issue before I did. I left this open just in case there was any serious hesitation with making the certificate names predictable. |
Pull Request Motivation
Although this may not be fixing the root cause of #4956, @munnerz identified this as a possible workaround until a more robust solution can be developed. Presently, the working theory is that the apiserver is not responding in the allotted time and thus a duplicate certificate request is created which clashes with the one that was initially created. Ideally, we would have a way to detect that there is already another certificate in flight before we attempt to create a new one.
Quoting @munnerz :
More details about the discussion can be found on this slack thread
Signed-off-by: Cody W. Eilar ecody@vmware.com
Kind
/kind feature
Release Note