You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Will add an e2e test to ensure that the pod with the expanded DNS config can be
162
-
created and run successfully.
163
+
Tests in `test/e2e/network/dns.go`:
164
+
165
+
-[It][sig-network] DNS should work with the pod containing more than 6 DNS search paths and longer than 256 search list characters: [results](https://storage.googleapis.com/k8s-triage/index.html?job=ci-kubernetes-kind-e2e-parallel&test=should%20work%20with%20the%20pod%20containing%20more%20than%206%20DNS%20search%20paths%20and%20longer%20than%20256%20search%20list%20characters)
163
166
164
167
### Graduation Criteria
165
168
@@ -221,7 +224,7 @@ the expanded DNS configuration.
221
224
222
225
Yes, the feature can be disabled by disabling the feature gate.
223
226
224
-
Before disabling the feature gate, is is recommended to remove objects
227
+
Before disabling the feature gate, it is recommended to remove objects
225
228
containing podsTemplate with the expanded DNS config as newly created pods will
226
229
be rejected by the apiserver.
227
230
@@ -356,6 +359,12 @@ The DNS lookup time can be increased, but it will be negligible.
356
359
357
360
No
358
361
362
+
-**Can enabling / using this feature result in resource exhaustion of some node resources (PIDs, sockets, inodes, etc.)?**
363
+
364
+
No, this cannot result in resource exhaustion of node resources as setting
365
+
longer DNS search list to `/etc/resolv.conf` only affects the process running
366
+
inside the container.
367
+
359
368
### Troubleshooting
360
369
361
370
-**How does this feature react if the API server and/or etcd is unavailable?**
0 commit comments