-
Notifications
You must be signed in to change notification settings - Fork 436
fix: parameter passing error #6715
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
✅ Deploy Preview for kubernetes-sigs-kueue ready!
To edit notification comments on pull requests, go to your Netlify project configuration. |
Hi @Panlq. Thanks for your PR. I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
@Panlq Thanks for reporting and proposing the fix. Since this is a bugfix it needs a release note, proposal:
|
/ok-to-test |
/test pull-kueue-test-e2e-tas-main |
@mimowo , Hello. I have a question. For the existing inference service Deployment / StatefuleSet, if it is to be managed by kueue and upgraded again, due to this validation verification limitation, an error will be reported. Is this scenario in line with the design? |
Hi I may not fully understand the question. This change does not impact when the validation errors are reported. It only fixes the message building to report the original (old) value. Or your question goes beyond this particular PR? |
Yes, I discovered this issue while integrating an existing inference service with Kueue. The label kueue.x-k8s.io/queue-name of the existing Deployment is empty, and once integrated with Kueue, a queue-name will be injected into this label. However, based on the current update validation logic, an error is triggered. Does this scenario align with the design? Inference services are not one-time tasks. Some of the already running ones cannot be deleted or recreated. When we need to integrate them with Kueue for quota management, we will encounter admission check failures during the subsequent service upgrade. Let’s discuss whether it is necessary to support this scenario. |
I see, thank you for clarifying.
I don't think it is called in the design. I would say it was rather a precaution to validate against it, so I'm open to setting the label. However, we would need to test manually if this works as expected. |
Let me merge this one for now, as this is clearly a bug, but I'm open to the follow up. /lgtm |
@mimowo: once the present PR merges, I will cherry-pick it on top of In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
LGTM label has been added. Git tree hash: e2e6ea396b0c3dbd8467f0f0ad364aa74c7a501b
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: mimowo, Panlq The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/kind bug |
@mimowo: new pull request created: #6716 In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
@mimowo: new pull request created: #6717 In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
Okay, thank you. I'll open a new discussion to address this issue. #6718 |
What type of PR is this?
Fixes #
Special notes for your reviewer:
Does this PR introduce a user-facing change?