-
Notifications
You must be signed in to change notification settings - Fork 375
SIGCONT is not terminating kube-dns container as it should #276
Comments
I have spent some time on this and I have narrowed down the expectations from The timeout is set through the call to StopContainer(), and here are the parameters for this API. Now, when our cluster is running and that we call into And we should not have experienced any issue if we had the patch cri-o/cri-o#1419 (already merged into CRI-O master, but not in CRI-O 1.9), because CRI-O would have issued the This confirms the fact it is still good to handle a SIGKILL from the shim because we might not anticipate all the cases. But #275 definitely solved the issue and backporting cri-o/cri-o#1419 to CRI-O 1.9 could be a pretty good idea. |
I think we can close this now, please feel free ! |
Nice digging @sboeuf - thanks for the update. Yes, I'm happy that we/you know know what happens why, and how we handle it :-) - closing! |
Fixes: kata-containers#276 Signed-off-by: Nitesh Konkar [email protected]
We need to investigate why the
SIGCONT
signal sent does not terminate the container process when thekube-dns
pod is torn down. CRI-O expects this signal to terminate the container, meaning we're missing something in our codebase to handle such a corner case.The text was updated successfully, but these errors were encountered: