New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
APF borrowing by exempt does not match KEP #124125
Comments
A short version of the difference is this: the KEP says that the exempt priority level gets everything it wants and the other levels compete over the rest of the server's concurrency limit, while the implementation has the exempt priority level competing with the others on a level playing field. |
@kubernetes/sig-api-machinery-bugs |
I think we should fix that to what is described in the KEP - in the end all requests from exempt are executed anyway, so pretending they don't occupy resources is just cheating ourselves... I think we should just change the code to reflect what's described in the KEP. |
/triage accepted |
What happened?
In reviewing the KEP and the implementation, I noticed a difference in the way that the exempt priority level borrows from the others. In the KEP, in section https://github.com/kubernetes/enhancements/tree/master/keps/sig-api-machinery/1040-priority-and-fairness#dispatching (this material was added in kubernetes/enhancements#3906), we see (among many other things) the following definition.
But in the implementation (
kubernetes/staging/src/k8s.io/apiserver/pkg/util/flowcontrol/apf_controller.go
Line 407 in 3dedb8e
The KEP continues with some considerations for what to do if the exempt priority levels want to use up the whole server concurrency limit, or enough to prevent the non-exempt priority levels from getting their minimum allocations. These are also absent from the implementation --- naturally enough, since those situations cannot arise in the current implementation.
What did you expect to happen?
Consistency
How can we reproduce it (as minimally and precisely as possible)?
This is from code and doc inspection, as described above.
Anything else we need to know?
No response
Kubernetes version
1.28.0 and later.
Cloud provider
OS version
N/A
Install tools
Container runtime (CRI) and version (if applicable)
Related plugins (CNI, CSI, ...) and versions (if applicable)
The text was updated successfully, but these errors were encountered: