-
Notifications
You must be signed in to change notification settings - Fork 148
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
interface result parameter set for dpdk device #189
Comments
/cc @JanScheurich |
Are there implications of keeping the interface name in results empty ? is that OK from CNI spec POV? One thing i can think of is that we rely on it (to be provided in CmdAdd / CmdDel) to cache the state of the VF.
|
Discussed in Monday's resource mgmt meeting: Interface name is used as reference when caching the CNI config in sriov-cni, this is true also for dpdk interface. To remove it, there are several considerations:
An alternative is to add another field in device-info spec (e.g. driver) to indicate whether interface is using vfio-pci or kernel driver, so that application knows how to make use of the device. In such case, |
What happened?
The
k8s.v1.cni.cncf.io/networks-status
pod annotation containsinterface
parameter set tonet1
for dpdk device.What did you expect to happen?
The interface parameter must not get displayed for dpdk device, This is because
result.Interfaces
is set here even for dpdk case.What are the minimal steps needed to reproduce the bug?
create a pod with secondary network attachment for dpdk device.
Anything else we need to know?
currently even with
k8s.v1.cni.cncf.io/network-status
annotation downward API mount inside the pod container, there is no direct way to identify given pci address is net or dpdk device.should
PciDevice
in DeviceInfo contain bound driver parameter to figure out type of device inside the pod container ?Component Versions
Please fill in the below table with the version numbers of applicable components used.
Config Files
Config file locations may be config dependent.
CNI config (Try '/etc/cni/net.d/')
Device pool config file location (Try '/etc/pcidp/config.json')
Multus config (Try '/etc/cni/multus/net.d')
Kubernetes deployment type ( Bare Metal, Kubeadm etc.)
Kubeconfig file
SR-IOV Network Custom Resource Definition
Logs
SR-IOV Network Device Plugin Logs (use
kubectl logs $PODNAME
)Multus logs (If enabled. Try '/var/log/multus.log' )
Kubelet logs (journalctl -u kubelet)
The text was updated successfully, but these errors were encountered: