-
Notifications
You must be signed in to change notification settings - Fork 16
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Inject NSM-envs into NSM-containers #18
Conversation
Signed-off-by: Artem Glazychev <artem.glazychev@xored.com>
@glazychev-art What problem are we trying to solve here? I'm a little reluctant to have the mechanism for tuning these parameters be scraping them from other containers configs. Why do we need to be tuning these parameters? |
@edwarnicke
I try to add annotations:
|
Why do we need to use NSM_REQUEST_TIMEOUT? What is the default? |
Default is 15s. |
@glazychev-art OK... why is that not enough for some tests? |
@edwarnicke |
@edwarnicke
Please share your thoughts |
Why is that taking 15s? |
Because the client is waiting for its request to go through all of the We can also consider new option: |
@artem-belov How many passthrough NSEs? How long is each taking? 15s is a very long time... |
Our test uses 4 passthrough NSEs |
Each NSE starts asynchronously in a random order. And in the worst case, it may take more than 15s. As for the possible options, I suppose expanding annotations is better |
Re-test nse-composition - networkservicemesh/deployments-k8s#2690 |
the root issue was closed: networkservicemesh/deployments-k8s#2009 |
networkservicemesh/deployments-k8s#2009
Sometimes we want to use additional
NSM
envs for NSC (e.g.NSM_REQUEST_TIMEOUT
).If the user set these envs, webhook should inject them into
NSM
-containers.Signed-off-by: Artem Glazychev artem.glazychev@xored.com