-
Notifications
You must be signed in to change notification settings - Fork 4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Questions on AEP-4016: Support for in place updates in VPA #7722
Comments
/area vertical-pod-autoscaler |
Link: https://kubernetes.slack.com/archives/C06FSK01BGU/p1737064355023329 |
Could you clarify which conditions are you referring to for which types of actuations? Are you referring to the conditions for Ie,
I get the feeling that the AEP wasn't written with this in mind. I'm of the opinion that it needs to be updated. I see this text in the KEP:
Which confirms what Vinay says. |
Thanks for the response. After re-reading the AEP, I think I realized where my confusion is coming from. The reason why I thought we should know an update would restart or not is because I thought the decision of disruption/disruption-less dictated the conditions of applying the updates. The disruptionless actuation conditions are actually a subset of the disruptive actuation conditions. When we "attempt" a disruptionless update, it would potentially actually be disruptive. So it's possible that this disruptive update will "sneak through", regardless of the other disruptive actuation conditions were actually met (namely
I guess I am mostly referring to EDIT: Disruptive updates can apparently also ignore pod disruption budgets, so that is another point of contention on whether the kubelet or the VPA should potentially handle this. |
And another question is related to the test plan:
Does this mean we have to guarantee that this update is disruption free in the test (cause we can't)? Or are we just simply checking that it wasn't updated through eviction, and that the actuation conditions for disruption-free were met (meaning that containers could've restarted!) And same thing with this test:
Does this just mean that all the containers will have |
Which component are you using?:
/area vertical-pod-autoscaler
Now that support for feature gated
InPlacePodVerticalScaling
has almost reached Beta graduation in the kubernetes API, it draws nearer that the details of AEP-4016 should be clear, since early development has already started in implementing the AEP and bringing the in-place updates to the VPA: #7673There are some questions I still have about the AEP, namely about disruptionless/disruptive updates.
Since the conditions are different for both types of actuation, how can we actually make sure the first set of actions will actually be disruption free? I think this problem requires the need for a third resizePolicy MustNotRestart as mentioned in the AEP. However, I asked in the
sig-node-inplace-pod-resize
slack channel about the possibility of this, and it seems it is impossible for now from a response from Vinay:There is also no way ahead of time to know if your resize request will cause a container restart either.
I believe causes some problems about the AEP-4016 details, as there is only best-effort disrupionless updates. If I am understanding correctly, we should always assume worst case disruptive updates, meaning we will have to apply in-place updates only under the same conditions that apply in Recreate mode, and that this requires amendment to the AEP.
Please let me know if I assuming incorrectly, or if there are any thoughts on this.
The text was updated successfully, but these errors were encountered: