Skip to content

Conversation

@DavidHurta
Copy link
Contributor

@DavidHurta DavidHurta commented Oct 9, 2023

This enhancement describes the API changes needed to provide a simple way of dynamically changing the verbosity level of Cluster Version Operator's logs.

This pull request references https://issues.redhat.com/browse/OTA-1029

@openshift-ci-robot openshift-ci-robot added the jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. label Oct 9, 2023
@openshift-ci-robot
Copy link

openshift-ci-robot commented Oct 9, 2023

@Davoska: This pull request references OTA-1029 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.15.0" version, but no target version was set.

Details

In response to this:

This enhancement describes the API changes needed to provide a simple way of dynamically changing the Cluster Version Operator's log level.

This pull request references https://issues.redhat.com/browse/OTA-1029

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@openshift-ci openshift-ci bot added the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label Oct 9, 2023
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Oct 9, 2023

Skipping CI for Draft Pull Request.
If you want CI signal for your change, please convert it to an actual PR.
You can still manually trigger a test run with /test all

@DavidHurta
Copy link
Contributor Author

/test all

@DavidHurta
Copy link
Contributor Author

/test all

@petr-muller
Copy link
Member

/cc

@openshift-ci openshift-ci bot requested a review from petr-muller October 10, 2023 10:29
@DavidHurta DavidHurta force-pushed the cvo-logging branch 5 times, most recently from 1056f05 to 8380ff6 Compare October 12, 2023 14:51
@DavidHurta DavidHurta requested a review from wking October 12, 2023 14:54
@DavidHurta DavidHurta marked this pull request as ready for review October 17, 2023 11:06
@openshift-ci openshift-ci bot removed the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label Oct 17, 2023
@DavidHurta
Copy link
Contributor Author

PTAL, reviewers @LalatenduMohanty @wking @petr-muller

@DavidHurta
Copy link
Contributor Author

PTAL, API approver @deads2k

@DavidHurta DavidHurta requested review from csrwng and enxebre October 17, 2024 14:14
@DavidHurta DavidHurta requested a review from JoelSpeed November 4, 2024 10:44
@DavidHurta DavidHurta requested a review from enxebre November 4, 2024 18:06
Copy link
Contributor

@JoelSpeed JoelSpeed left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Apart from 2 small bits, all looks good to me

configuration API will be introduced in the hosted cluster that would have to be
otherwise protected by a validating admission policy.

The configuration file may be a manifest file of a `ClusterVersionOperator`
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Why may? May implies you haven't decided, but, I thought we had concluded that this was a good approach since it meant we already knew how to decode the object and all of the available options? I guess the one issue is if the hosted version needs a new configuration that the standalone version does not

Copy link
Contributor Author

@DavidHurta DavidHurta Nov 11, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It's a GREAT option, and it will be implemented in such a way with the probability of 99%. My thinking was to not write in stone the definitive implementation details of such a matter.

However, now that I think about it, there is no need to leave the space open, as the option was openly discussed and was agreed upon in this enhancement. There is no need. I have updated the wording. In case we discover a greatly better alternative while developing, we can always circle back.

I guess the one issue is if the hosted version needs a new configuration that the standalone version does not

My thinking was we could then create a new API, HostedClusterVersionOperator. Its CRD would not be applied to any cluster. The hosted CVO could then load a manifest file of this kind. The CVO could then differentiate the configuration files based on the GroupVersionKind and would act accordingly. Something along these lines. A new API to communicate between components while not being exposed to users. Teaching the CVO a new configuration file format is the idea.


// ClusterVersionOperatorStatus defines the observed status of the Cluster Version Operator.
type ClusterVersionOperatorStatus struct {
// observedGeneration is the last generation change you've dealt with
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We will want to expand on this to be specific about the use case, but we can do that in the API review

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You mean the description of the observedGeneration field? Yes, it could be more descriptive about its use. Noted, thanks, I will follow up on that in the API review.

@DavidHurta
Copy link
Contributor Author

DavidHurta commented Nov 13, 2024

I have squashed the commits, as there are no longer any open requests for changes (In case you want to review the last few commits, the history is present at this link).

I would like to ask reviewers to explicitly state their approval of the changes or express any remaining questions or suggestions for changes. Thank you!

Copy link
Member

@petr-muller petr-muller left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@enxebre
Copy link
Member

enxebre commented Nov 15, 2024

/lgtm

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Nov 15, 2024
@DavidHurta DavidHurta requested a review from JoelSpeed November 26, 2024 12:54
@JoelSpeed
Copy link
Contributor

/lgtm

Approval now down to @wking

@openshift-ci openshift-ci bot removed the lgtm Indicates that a PR is ready to be merged. label Nov 27, 2024
@DavidHurta
Copy link
Contributor Author

I apologize, wking is not an approver. I have force-pushed from 0c33618 to d23d516 (compare) to set PratikMahajan as the approver.

This is currently blocked on #1722.

@petr-muller
Copy link
Member

/lgtm
/assign @PratikMahajan

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Dec 2, 2024
Copy link
Contributor

@PratikMahajan PratikMahajan left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Dec 2, 2024

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: petr-muller, PratikMahajan

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Dec 2, 2024
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Dec 2, 2024

@DavidHurta: all tests passed!

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. lgtm Indicates that a PR is ready to be merged.

Projects

None yet

Development

Successfully merging this pull request may close these issues.