mirror of
https://github.com/kyverno/kyverno.git
synced 2025-03-31 03:45:17 +00:00
BugFix - update the annotation lastRequestTimestamp from active instances (#2019)
* fix webhook monitor - inactive instance did not get latest request timestamp Signed-off-by: Shuting Zhao <shutting06@gmail.com> * add checks for registered webhook configs Signed-off-by: Shuting Zhao <shutting06@gmail.com> * update veridy_deployment.sh Signed-off-by: Shuting Zhao <shutting06@gmail.com> * add debug steps in e2d workflow Signed-off-by: Shuting Zhao <shutting06@gmail.com> * fix CI errors Signed-off-by: Shuting Zhao <shutting06@gmail.com>
This commit is contained in:
parent
6b85b6dc95
commit
6d5e988ebe
3 changed files with 44 additions and 34 deletions
8
.github/workflows/e2e.yaml
vendored
8
.github/workflows/e2e.yaml
vendored
|
@ -100,3 +100,11 @@ jobs:
|
||||||
run: |
|
run: |
|
||||||
kubectl create namespace kyverno
|
kubectl create namespace kyverno
|
||||||
ct install --target-branch=main --namespace=kyverno
|
ct install --target-branch=main --namespace=kyverno
|
||||||
|
|
||||||
|
- name: Debug failure
|
||||||
|
if: failure()
|
||||||
|
run: |
|
||||||
|
kubectl get mutatingwebhookconfigurations,validatingwebhookconfigurations
|
||||||
|
kubectl -n kyverno get pod
|
||||||
|
kubectl -n kyverno describe pod | grep -i events -A10
|
||||||
|
kubectl -n kyverno logs deploy/kyverno
|
|
@ -76,7 +76,7 @@ func (t *Monitor) SetTime(tm time.Time) {
|
||||||
func (t *Monitor) Run(register *Register, certRenewer *tls.CertRenewer, eventGen event.Interface, stopCh <-chan struct{}) {
|
func (t *Monitor) Run(register *Register, certRenewer *tls.CertRenewer, eventGen event.Interface, stopCh <-chan struct{}) {
|
||||||
logger := t.log
|
logger := t.log
|
||||||
|
|
||||||
logger.V(4).Info("starting webhook monitor", "interval", idleCheckInterval)
|
logger.V(4).Info("starting webhook monitor", "interval", idleCheckInterval.String())
|
||||||
status := newStatusControl(register, eventGen, t.log.WithName("WebhookStatusControl"))
|
status := newStatusControl(register, eventGen, t.log.WithName("WebhookStatusControl"))
|
||||||
|
|
||||||
ticker := time.NewTicker(tickerInterval)
|
ticker := time.NewTicker(tickerInterval)
|
||||||
|
@ -92,7 +92,18 @@ func (t *Monitor) Run(register *Register, certRenewer *tls.CertRenewer, eventGen
|
||||||
}
|
}
|
||||||
|
|
||||||
timeDiff := time.Since(t.Time())
|
timeDiff := time.Since(t.Time())
|
||||||
if timeDiff > idleDeadline {
|
lastRequestTimeFromAnn := lastRequestTimeFromAnnotation(register, t.log.WithName("lastRequestTimeFromAnnotation"))
|
||||||
|
if lastRequestTimeFromAnn == nil {
|
||||||
|
if err := status.UpdateLastRequestTimestmap(t.Time()); err != nil {
|
||||||
|
logger.Error(err, "failed to annotate deployment for lastRequestTime")
|
||||||
|
} else {
|
||||||
|
logger.Info("initialized lastRequestTimestamp", "time", t.Time())
|
||||||
|
}
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
switch {
|
||||||
|
case timeDiff > idleDeadline:
|
||||||
err := fmt.Errorf("admission control configuration error")
|
err := fmt.Errorf("admission control configuration error")
|
||||||
logger.Error(err, "webhook check failed", "deadline", idleDeadline.String())
|
logger.Error(err, "webhook check failed", "deadline", idleDeadline.String())
|
||||||
if err := status.failure(); err != nil {
|
if err := status.failure(); err != nil {
|
||||||
|
@ -101,52 +112,36 @@ func (t *Monitor) Run(register *Register, certRenewer *tls.CertRenewer, eventGen
|
||||||
|
|
||||||
if err := register.Register(); err != nil {
|
if err := register.Register(); err != nil {
|
||||||
logger.Error(err, "Failed to register webhooks")
|
logger.Error(err, "Failed to register webhooks")
|
||||||
} else {
|
|
||||||
// if the status was false before then we update it to true
|
|
||||||
// send request to update the Kyverno deployment
|
|
||||||
if err := status.success(); err != nil {
|
|
||||||
logger.Error(err, "failed to annotate deployment webhook status to success")
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
continue
|
case timeDiff > 2*idleCheckInterval:
|
||||||
}
|
|
||||||
|
|
||||||
if timeDiff > idleCheckInterval {
|
|
||||||
if skipWebhookCheck(register, logger.WithName("skipWebhookCheck")) {
|
if skipWebhookCheck(register, logger.WithName("skipWebhookCheck")) {
|
||||||
logger.Info("skip validating webhook status, Kyverno is in rolling update")
|
logger.Info("skip validating webhook status, Kyverno is in rolling update")
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
|
|
||||||
lastRequestTimeFromAnn := lastRequestTimeFromAnnotation(register, t.log.WithName("lastRequestTimeFromAnnotation"))
|
|
||||||
if lastRequestTimeFromAnn == nil {
|
|
||||||
now := time.Now()
|
|
||||||
lastRequestTimeFromAnn = &now
|
|
||||||
if err := status.UpdateLastRequestTimestmap(t.Time()); err != nil {
|
|
||||||
logger.Error(err, "failed to annotate deployment for lastRequestTime")
|
|
||||||
} else {
|
|
||||||
logger.Info("initialized lastRequestTimestamp", "time", lastRequestTimeFromAnn)
|
|
||||||
}
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
|
|
||||||
if t.Time().Before(*lastRequestTimeFromAnn) {
|
if t.Time().Before(*lastRequestTimeFromAnn) {
|
||||||
t.SetTime(*lastRequestTimeFromAnn)
|
t.SetTime(*lastRequestTimeFromAnn)
|
||||||
logger.V(3).Info("updated in-memory timestamp", "time", lastRequestTimeFromAnn)
|
logger.V(3).Info("updated in-memory timestamp", "time", lastRequestTimeFromAnn)
|
||||||
continue
|
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
|
||||||
idleT := time.Since(*lastRequestTimeFromAnn)
|
idleT := time.Since(*lastRequestTimeFromAnn)
|
||||||
if idleT > idleCheckInterval*2 {
|
if idleT > idleCheckInterval {
|
||||||
logger.V(3).Info("webhook idle time exceeded", "lastRequestTimeFromAnn", (*lastRequestTimeFromAnn).String(), "deadline", (idleCheckInterval * 2).String())
|
if t.Time().After(*lastRequestTimeFromAnn) {
|
||||||
|
logger.V(3).Info("updating annotation lastRequestTimestamp with the latest in-memory timestamp", "time", t.Time())
|
||||||
if err := status.UpdateLastRequestTimestmap(t.Time()); err != nil {
|
if err := status.UpdateLastRequestTimestmap(t.Time()); err != nil {
|
||||||
logger.Error(err, "failed to update lastRequestTimestamp annotation")
|
logger.Error(err, "failed to update lastRequestTimestamp annotation")
|
||||||
} else {
|
|
||||||
logger.V(3).Info("updated annotation lastRequestTimestamp", "time", t.Time())
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// if the status was false before then we update it to true
|
||||||
|
// send request to update the Kyverno deployment
|
||||||
|
if err := status.success(); err != nil {
|
||||||
|
logger.Error(err, "failed to annotate deployment webhook status to success")
|
||||||
|
}
|
||||||
|
|
||||||
case <-stopCh:
|
case <-stopCh:
|
||||||
// handler termination signal
|
// handler termination signal
|
||||||
logger.V(2).Info("stopping webhook monitor")
|
logger.V(2).Info("stopping webhook monitor")
|
||||||
|
@ -179,7 +174,7 @@ func lastRequestTimeFromAnnotation(register *Register, logger logr.Logger) *time
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
annotation, ok, err := unstructured.NestedStringMap(deploy.UnstructuredContent(), "metadata", "annotations")
|
timeStamp, ok, err := unstructured.NestedString(deploy.UnstructuredContent(), "metadata", "annotations", annLastRequestTime)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
logger.Info("unable to get annotation", "reason", err.Error())
|
logger.Info("unable to get annotation", "reason", err.Error())
|
||||||
return nil
|
return nil
|
||||||
|
@ -190,10 +185,9 @@ func lastRequestTimeFromAnnotation(register *Register, logger logr.Logger) *time
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
timeStamp := annotation[annLastRequestTime]
|
|
||||||
annTime, err := time.Parse(time.RFC3339, timeStamp)
|
annTime, err := time.Parse(time.RFC3339, timeStamp)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
logger.Error(err, "failed to parse timestamp annotation")
|
logger.Error(err, "failed to parse timestamp annotation", "timeStamp", timeStamp)
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -122,3 +122,11 @@ while [[ ${updated_replicas} -lt ${specified_replicas} || ${current_replicas} -g
|
||||||
done
|
done
|
||||||
|
|
||||||
echo "Deployment ${deployment} successful. All ${available_replicas} replicas are ready."
|
echo "Deployment ${deployment} successful. All ${available_replicas} replicas are ready."
|
||||||
|
|
||||||
|
mutatingwebhookconfigurations=$(kubectl get mutatingwebhookconfigurations | wc -l)
|
||||||
|
validatingwebhookconfigurations=$(kubectl get validatingwebhookconfigurations | wc -l)
|
||||||
|
while [[ ${mutatingwebhookconfigurations} -lt 4 || ${validatingwebhookconfigurations} -lt 3 ]]; do
|
||||||
|
sleep 5
|
||||||
|
done
|
||||||
|
|
||||||
|
echo "All webhooks are registered."
|
Loading…
Add table
Reference in a new issue