Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[BUG] When reusing mountpod, reusing existing meta #1105

Open
teddy-hackle opened this issue Sep 3, 2024 · 2 comments
Open

[BUG] When reusing mountpod, reusing existing meta #1105

teddy-hackle opened this issue Sep 3, 2024 · 2 comments
Labels
kind/bug Something isn't working

Comments

@teddy-hackle
Copy link

teddy-hackle commented Sep 3, 2024

What happened:

  1. Storage class is the same.
  2. Use different secret (metaurl is different)
  3. Even if different secret is used in the same node, pv is created with existing secret

What you expected to happen:
pv with different metal url is mounted

How to reproduce it (as minimally and precisely as possible):

  1. Use only one storage class (e.g. jfs)
  2. Create 2 secret, enter different meta url
  3. Mount pvc with different secret in same node

Anything else we need to know?

Environment:

  • JuiceFS CSI Driver version (which image tag did your CSI Driver use): v0.24.6
  • Kubernetes version (e.g. kubectl version): 1.30
  • Object storage (cloud provider and region): s3
  • Metadata engine info (version, cloud provider managed or self maintained): aws eks
  • Network connectivity (JuiceFS to metadata engine, JuiceFS to object storage): redis / s3
  • Others: Related PR
@teddy-hackle teddy-hackle added the kind/bug Something isn't working label Sep 3, 2024
@zxh326
Copy link
Member

zxh326 commented Sep 4, 2024

plz provide the applied YAML and the CSI log.

@teddy-hackle
Copy link
Author

I need time to upgrade and recreate yaml and log again.
But it's very easy to recreate.

In my memory, in the past, when multiple secretes were used, different mount pods were created, and secretes were also created by naming them.

However, now, only one secret is made to be a specific name for each namespace, and the mount pod all operate based on the meta url of the secret first made using the same secret.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/bug Something isn't working
Projects
None yet
Development

No branches or pull requests

2 participants