-
Notifications
You must be signed in to change notification settings - Fork 160
fix: intree volume unmount failure #2687
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: andyzhangx The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
3f70d7e
to
94a9a52
Compare
/cherrypick release-1.33 |
/cherrypick release-1.32 |
@andyzhangx: new pull request created: #2689 In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
@andyzhangx: new pull request created: #2690 In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
@andyzhangx is this issue applicable only to the in-tree volumes? |
@nearora-msft in-tree volume would make the mount path longer than csi volume, and from what users have reported, all such issues are due to using in-tree volume, I don't see there is csi volume hitting such issue up till now, do you have any? |
Oh I see, thanks for responding. No I haven't seen any other than this. |
@andyzhangx on another note, why was enableKataCCMount path invoked for the customer? Shouldn't it be disabled by default unless the cx has set it in storageclass or PV? |
@nearora-msft that would require an extra config in sc if user wants to mount pv on kata enabled node, with current design, as long as it's kata enabled node, user could mount azure file volume directly without any extra config. |
What type of PR is this?
/kind bug
What this PR does / why we need it:
fix: intree volume unmount failure
though intree volume is not supported any more, we still want to address the unmount failure if there is solution with best efforts
Which issue(s) this PR fixes:
Fixes #
Requirements:
Special notes for your reviewer:
Release note: