-
Notifications
You must be signed in to change notification settings - Fork 224
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: support new topologySpread scheduling constraints #852
base: main
Are you sure you want to change the base?
feat: support new topologySpread scheduling constraints #852
Conversation
aed9f49
to
54af319
Compare
Pull Request Test Coverage Report for Build 13139823506Details
💛 - Coveralls |
4329131
to
f0127f2
Compare
b23a605
to
0408162
Compare
0408162
to
6673b5b
Compare
Holding to include |
/remove blocked |
Sorry @jmdeal for bothering, but any plans for moving forward with this? |
dae9cfd
to
1d46f34
Compare
1d46f34
to
7b3827f
Compare
Hi @jmdeal is there anything blocking this or any way I can help to move this on (testing a custom build or something)? |
/assign @njtran |
@engedaam: GitHub didn't allow me to assign the following users: njtarn. Note that only kubernetes-sigs members with read permissions, repo collaborators and people who have commented on this issue/PR can be assigned. Additionally, issues/PRs can only have 10 assignees at the same time. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
/assign @njtran |
/unassign njtran |
/assign jonathan-innis |
And I think I figured out why! Turns out that we really haven't been doing our scheduling benchmarking correctly in a while! See #1930 |
5958693
to
01de6ac
Compare
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: jmdeal The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
for domain := range domains { | ||
domainCounts[domain] = 0 | ||
} | ||
func NewTopologyGroup(topologyType TopologyType, topologyKey string, pod *v1.Pod, namespaces sets.Set[string], labelSelector *metav1.LabelSelector, maxSkew int32, minDomains *int32, taintPolicy *v1.NodeInclusionPolicy, affinityPolicy *v1.NodeInclusionPolicy, domainGroup TopologyDomainGroup) *TopologyGroup { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
func NewTopologyGroup(topologyType TopologyType, topologyKey string, pod *v1.Pod, namespaces sets.Set[string], labelSelector *metav1.LabelSelector, maxSkew int32, minDomains *int32, taintPolicy *v1.NodeInclusionPolicy, affinityPolicy *v1.NodeInclusionPolicy, domainGroup TopologyDomainGroup) *TopologyGroup { | |
func NewTopologyGroup(topologyType TopologyType, topologyKey string, pod *v1.Pod, namespaces sets.Set[string], labelSelector *metav1.LabelSelector, maxSkew int32, minDomains *int32, taintPolicy, affinityPolicy *v1.NodeInclusionPolicy, domainGroup TopologyDomainGroup) *TopologyGroup { |
the tiniest nit known to man
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I've reformatted to put each argument on it's own line, since this is beginning to wrap off of my screen. Given that, I think leaving both types in is more readable, but let me know what you think. Personally, I prefer always including the types as I find it a little more readable, but I don't feel to strongly.
First pass -- I didn't look at everything and have some starting questions |
/remove-label blocked |
@rschalo: The label(s) In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
09e5867
to
a00643d
Compare
Fixes #430
Description
This PR adds support for the following topology spread constraint fields:
matchLabelKeys
nodeAffinityPolicy
nodeTaintsPolicy
How was this change tested?
make test
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.