-
Notifications
You must be signed in to change notification settings - Fork 40
WIP add IsNodeCandidateForDeletion clusterapi implementation #380
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/retest |
2 similar comments
/retest |
/retest |
611335f
to
c0051f4
Compare
/test e2e-aws-periodic-pre |
This function allows cloud providers to specify when a node is not a good candidate for deletion. This will occur before the autoscaler has begun to cordon, drain, and taint any node for deletion.
The initial implementation of this function for clusterapi will return that a node is not a good candidate for deletion when it belongs to a MachineDeployment that is currently rolling out an upgrade.
c0051f4
to
672f838
Compare
/retest |
/test e2e-hypershift |
@elmiko: The following tests failed, say
Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
this is to address OCPBUGS-60790, currently testing this fix.