Skip to content

Conversation

jmencak
Copy link
Contributor

@jmencak jmencak commented Aug 7, 2025

This significantly reduces false reports of bootcmdline conflicts in operator logs and ClusterOperator/node-tuning object.

This is not a bullet-proof solution. A bullet-proof solution would involve adding a new annotation such as
tuned.openshift.io/lastProfileObservedGen to the Node tied to the Profile and comparing it to the Profile's generation prior to updating a MachineConfig. However, we want to avoid putting extra load on the API server as much as possible and this simpler solution already significantly reduces false reports of bootcmdline conflicts.

@openshift-ci openshift-ci bot requested review from MarSik and yanirq August 7, 2025 08:36
Copy link
Contributor

openshift-ci bot commented Aug 7, 2025

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: jmencak

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Aug 7, 2025
This significantly reduces false reports of bootcmdline conflicts in operator
logs and ClusterOperator/node-tuning object.

This is not a bullet-proof solution.  A bullet-proof solution would
involve adding a new annotation such as
tuned.openshift.io/lastProfileObservedGen to the Node tied to the
Profile and comparing it to the Profile's generation prior to updating
a MachineConfig.  However, we want to avoid putting extra load on the
API server as much as possible and this simpler solution already
significantly reduces false reports of bootcmdline conflicts.
@jmencak jmencak force-pushed the 4.20-bootcmdline-conflict branch from 85cc657 to e8a6d46 Compare August 11, 2025 11:07
@jmencak
Copy link
Contributor Author

jmencak commented Aug 11, 2025

/cc @liqcui
as he initially reported this.

@openshift-ci openshift-ci bot requested a review from liqcui August 11, 2025 11:18
@jmencak
Copy link
Contributor Author

jmencak commented Aug 11, 2025

/retest

1 similar comment
@yanirq
Copy link
Contributor

yanirq commented Aug 12, 2025

/retest

@jmencak
Copy link
Contributor Author

jmencak commented Aug 12, 2025

ci/prow/e2e-gcp-pao and ci/prow/e2e-hypershift-pao will keep failing until #1374 merges.

@liqcui
Copy link

liqcui commented Aug 13, 2025

/verified by @liqcui

@openshift-ci-robot openshift-ci-robot added the verified Signifies that the PR passed pre-merge verification criteria label Aug 13, 2025
@openshift-ci-robot
Copy link
Contributor

@liqcui: This PR has been marked as verified by @liqcui. Jira issue(s) in the title of this PR will be moved to the VERIFIED state when the change is available in an accepted nightly payload.

In response to this:

/verified by @liqcui

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@liqcui
Copy link

liqcui commented Aug 13, 2025

verified in a small size cluster, did several testing, no issue, the issue reproduced in the same small size worker nodes using 4.20 nightly version. the new pr did fix the issue

@jmencak
Copy link
Contributor Author

jmencak commented Aug 13, 2025

/retest

Copy link
Contributor

openshift-ci bot commented Aug 13, 2025

@jmencak: The following test failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/okd-scos-e2e-aws-ovn e8a6d46 link false /test okd-scos-e2e-aws-ovn

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. verified Signifies that the PR passed pre-merge verification criteria

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants