Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

add docker_only_prefix_whitelist flag and fix issue #2129 #2164

Merged
merged 1 commit into from
Feb 19, 2019

Conversation

viberan
Copy link
Contributor

@viberan viberan commented Feb 3, 2019

No description provided.

@k8s-ci-robot
Copy link
Collaborator

Hi @viberan. Thanks for your PR.

I'm waiting for a google or kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@dashpole
Copy link
Collaborator

dashpole commented Feb 4, 2019

/ok-to-test

cadvisor.go Outdated
@@ -65,6 +65,8 @@ var whitelistedContainerLabels = flag.String("whitelisted_container_labels", "",

var urlBasePrefix = flag.String("url_base_prefix", "", "prefix path that will be prepended to all paths to support some reverse proxies")

var dockerOnlyPrefixWhiteList = flag.String("docker_only_prefix_whitelist", "", "A comma-separated list of cgroup path prefix that needs to be collected even when docker-only is specified")
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

i'm not a particular fan of the naming for the docker_only flag, since it is runtime-specific. Can we call it raw_cgroup_roots or something? We can make it clear in the comment that setting it causes those cgroups to be collected even when --docker-only is specified since comments don't have backwards compatibility guarantees

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@dashpole would raw_cgroup_prefix_whitelist be a better fit?

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

that would be fine as well

@dashpole
Copy link
Collaborator

looks good, please squash

@viberan
Copy link
Contributor Author

viberan commented Feb 16, 2019

@dashpole done

Copy link
Collaborator

@dashpole dashpole left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm

@dashpole dashpole merged commit 1032888 into google:master Feb 19, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants