-
Notifications
You must be signed in to change notification settings - Fork 40.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AWS: Remove blackhole routes in our managed range #47572
Conversation
Blackhole routes otherwise acccumulate unboundedly. We also are careful to ensure that we do so only within the managed range, which requires enlisting the help of the routecontroller. Fix kubernetes#47524
So I think this is relatively low risk (because it is gated behind the blackhole boolean so it should be aws only). The issue is problematic for bigger users - multiple users have independently come up with their own workarounds. Assuming this merges, I will then immediately propose it for backport to the 1.6 branch, and the 1.7 branch if needed. Given that, @dchen1107 do you think we should put this into 1.7? |
/approve |
@dchen1107 looking at it now /assign chrislovecnm |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good
/assign @chrislovecnm |
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: chrislovecnm, dchen1107, justinsb Associated issue: 47524 The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these OWNERS Files:
You can indicate your approval by writing |
/test pull-kubernetes-kubemark-e2e-gce |
Automatic merge from submit-queue |
Blackhole routes otherwise acccumulate unboundedly. We also are careful
to ensure that we do so only within the managed range, which requires
enlisting the help of the routecontroller.
Fix #47524