-
Notifications
You must be signed in to change notification settings - Fork 40.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Stop container in unknown state before recreate or remove. #73802
Stop container in unknown state before recreate or remove. #73802
Conversation
I've verified this change with containerd: $ crictl ps -a
CONTAINER ID IMAGE CREATED STATE NAME ATTEMPT POD ID
d53dd39fdbdac 6dc8ef8287d38 49 years ago Unknown dnsmasq 0 778e8a4e83150
9989c77318d0c 4b2e93f0133d3 49 years ago Unknown sidecar 0 778e8a4e83150
aeb84b2a6394c 55a3c5209c5ea 49 years ago Unknown kubedns 0 778e8a4e83150
$ crictl ps -a
CONTAINER ID IMAGE CREATED STATE NAME ATTEMPT POD ID
a22d1329eac45 4b2e93f0133d3 2 seconds ago Running sidecar 1 778e8a4e83150
3736ab301c548 6dc8ef8287d38 2 seconds ago Running dnsmasq 1 778e8a4e83150
126c900939bc7 55a3c5209c5ea 3 seconds ago Running kubedns 1 778e8a4e83150
9989c77318d0c 4b2e93f0133d3 49 years ago Exited sidecar 0 778e8a4e83150
aeb84b2a6394c 55a3c5209c5ea 49 years ago Exited kubedns 0 778e8a4e83150
d53dd39fdbdac 6dc8ef8287d38 49 years ago Exited dnsmasq 0 778e8a4e83150 |
0a50ca6
to
51e2f2c
Compare
/test pull-kubernetes-e2e-gce |
@@ -692,20 +697,21 @@ func (m *kubeGenericRuntimeManager) purgeInitContainers(pod *v1.Pod, podStatus * | |||
} | |||
|
|||
// findNextInitContainerToRun returns the status of the last failed container, the | |||
// next init container to start, or done if there are no further init containers. | |||
// index of next init container to start, or done if there are no further init containers. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why changing this to index?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Sorry, I remember there was a reason... But I can't remember it now... Will change it back.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Done
Could you also make sure dockershim correctly returns no error when trying to remove a "dead" container? |
51e2f2c
to
48a2043
Compare
48a2043
to
de8ee94
Compare
Do you mean stop or remove? Stop is validated in the PR description. For remove, I can try to do it today. :) |
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: Random-Liu, yujuhong The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/retest Review the full test history for this PR. Silence the bot with an |
@Random-Liu: The following test failed, say
Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
Fixes #69060.
This makes sure that containers (both regular container and init container) in unknown state will be successfully stopped once before restart or remove.
Please note that based CRI
StopContainer
"must not return an error if the container has stopped.", so even if the container in unknown state is already stopped, we should not get an error. This is true for both containerd and Docker. /cc @mrunalp Is this true for cri-o?Please also note that an existing behavior that
KillPod
andpodKiller
doesn't kill containers in unknown state. https://github.com/kubernetes/kubernetes/blob/v1.14.0-alpha.2/pkg/kubelet/kubelet_pods.go#L788 (bothrunningPod
andConvertPodStatusToRunningPod
don't include containers in unknown state). This is EXPECTED.The reason is that we don't know whether containers in
unknown
state will becomeexited
after a successful stop, this is not defined in CRI yet, and hard to enforce. Although this is true for containerd, but it may not be true for other runtimes, e.g. for dockerDead
state:remove
andrecreate
doesn't expect the container state to transit intoexited
, they just expect thestop
not to return error. Once the container isremoved
orrecreated
, we'll not care about theunknown
state any more.However, for
killPod
orkillContainer
does expect that. Or else, when we kill a container in unknown state, we may end up killing the container again and again, because its state may stay unknown./cc @kubernetes/sig-node-pr-reviews