-
Notifications
You must be signed in to change notification settings - Fork 214
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fixed pdbMinAvailableGreaterThanHPAMinReplicas and added validation for pdbMinAvailableEqualToHPAMinReplicas. #1073
base: master
Are you sure you want to change the base?
Conversation
…aterThanOrEqualToHPAMinReplicas
Hi @YuMuuu, thanks for your contribution! After reviewing the changes and discussing internally, we believe this update introduces a breaking change. To avoid impacting current Polaris clients, we suggest the following approach:
Both changes we plan to release in a new minor version. I understand this may require additional changes to your PR. Please let me know if you have the bandwidth to make these adjustments, or if you'd prefer someone else to take it from here. Thanks again for your efforts! |
@vitorvezani |
79628dc
to
94863f3
Compare
94863f3
to
701c6f0
Compare
I made a logic fix to pdbMinAvailableGreaterThanHPAMinReplicas and added validation for pdbMinAvailableEqualToHPAMinReplicas. The names of the validations and their specifications have been aligned; however, it was found that pdbMinAvailableGreaterThanHPAMinReplicas and pdbMinAvailableEqualToHPAMinReplicas exhibit conflicting behavior. Specifically, the following cases are now allowed under pdbMinAvailableEqualToHPAMinReplicas: test/checks/pdbMinAvailableEqualToHPAMinReplicas/success-gt-percent.yaml
test/checks/pdbMinAvailableEqualToHPAMinReplicas/success-gt-scalar.yaml
These configurations are clearly incorrect. While applying both pdbMinAvailableGreaterThanHPAMinReplicas and pdbMinAvailableEqualToHPAMinReplicas together resolves the issue, using only pdbMinAvailableEqualToHPAMinReplicas could allow such incorrect configurations. Is this behavior acceptable? |
I believe this approach is acceptable, as it avoids triggering two policies for the same underlying issue. With both checks enabled by default, we can ensure all cases are covered. Let me know if you have any thoughts or concerns, @sudermanjr |
@vitorvezani @sudermanjr
What do you think? |
That's a valid approach as well. However, I see a potential issue during the first release: whereas if I'll discuss both options with Andy when he's back from his time off and keep you updated. |
Is Andy on a long vacation? |
This PR fixes #1071
Checklist
Description
What's the goal of this PR?
What changes did you make?
What alternative solution should we consider, if any?