-
Notifications
You must be signed in to change notification settings - Fork 40.9k
Skip validation for unsupported aggregated pod-level resource requests #131262
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Skip validation for unsupported aggregated pod-level resource requests #131262
Conversation
…quests Signed-off-by: Ho Kim <ho.kim@ulagbulag.io>
Please note that we're already in Test Freeze for the Fast forwards are scheduled to happen every 6 hours, whereas the most recent run was: Fri Apr 11 13:33:04 UTC 2025. |
Welcome @HoKim98! |
This issue is currently awaiting triage. If a SIG or subproject determines this is a relevant issue, they will accept it by applying the The Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
Hi @HoKim98. Thanks for your PR. I'm waiting for a kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: HoKim98 The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
@@ -4382,8 +4382,14 @@ func validatePodResourceConsistency(spec *core.PodSpec, fldPath *field.Path) fie | |||
// calculation without modifying AggregateContainerRequests method. | |||
aggrContainerReqs := resourcehelper.AggregateContainerRequests(&v1.Pod{Spec: *v1PodSpec}, resourcehelper.PodResourcesOptions{}) | |||
|
|||
supportedResourceNames := resourcehelper.SupportedPodLevelResources() |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nice find! Can you add some unit tests for this?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ok, I'll add some appropriate unit tests and get back to you!
Oh I see |
Reopened the PR to fix #132449 |
What type of PR is this?
/kind bug
What this PR does / why we need it:
Which issue(s) this PR fixes:
Fixes #132449
Special notes for your reviewer:
The pod-level resource map only supports
cpu
andmemory
.So, the other external resources (e.g.
example.com/gpu
) is not supported.But, when validating
Pod-level requests must be >= aggregate requests of all containers in a pod
, the validator testsexample.com/gpu
and returns errormust be greater than or equal to aggregate container requests of %s
.For example, the official example works like:
However, when we want to use external resources in the container, the problem occurs.
To use these external resources with pod-level resources, the pod-level resource validator should ignore these unsupported resources.
Does this PR introduce a user-facing change?
Additional documentation e.g., KEPs (Kubernetes Enhancement Proposals), usage docs, etc.: