-
Notifications
You must be signed in to change notification settings - Fork 32
Fix DR Status issue for discovered apps in Virtual Machine page #2128
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix DR Status issue for discovered apps in Virtual Machine page #2128
Conversation
packages/mco/components/modals/app-manage-policies/parsers/discovered-vm-parser.tsx
Show resolved
Hide resolved
packages/mco/components/dr-status-popover/parsers/virtualmachine-parser.tsx
Show resolved
Hide resolved
This needs more UX discussion. We need to discuss whether it is required as a separate UX to indicate that it protected at ns level |
Are the screenshots latest ? I can see that the second VM in the first shot is still missing its status |
It was created through the ApplicationSet UI, and no protection was applied. I also agree that there may be issues with VM applications created via the UI. We can review and address those separately. |
@TimothyAsirJeyasing what's the reason for this ?? what's the difference ?? |
Do we need to do this: https://github.com/red-hat-storage/odf-console/blob/master/packages/mco/components/modals/app-manage-policies/utils/k8s-utils.ts#L474-L476 anymore ?? If not, @TimothyAsirJeyasing plz do the proper/complete cleanup (from constants file as well). |
02ea1c4
to
b3c29fe
Compare
When a VM is protected via the Virtual Machines page, it typically gets labeled (e.g., kubevirt.io/instance) and is linked to an ApplicationSet or Subscription, which the parser uses to resolve DR status. In contrast, when protection is applied via the Protected Applications page, the VM is included in a namespace-level DRPC without necessarily having those labels or application associations. 1st case) : vm created thru applicationset-push/pull and namespace protected using discovered ns
|
Previously, the parser determined whether a VM was managed by an ApplicationSet or Subscription first, and only if neither was found, it treated the application as a "Discovered" application. This led to incorrect behavior when a VM was created via an ApplicationSet but was already protected using a DRPolicy (namespace-based). In such cases, the parser would wrongly try to fetch the app as a GitOps-managed application. What’s changed and why: If a matching DRPC is found, the parser immediately renders the DiscoveredParser, as this confirms the VM is already part of a DR-protected (discovered) application. Only if no DRPC is found, it falls back to checking if the VM belongs to a managed ApplicationSet or Subscription. |
… page https://issues.redhat.com/browse/DFBUGS-2822 https://issues.redhat.com/browse/DFBUGS-2823 Signed-off-by: Timothy Asir Jeyasingh <[email protected]>
b3c29fe
to
5d3de21
Compare
/test odf-console-e2e-aws |
1 similar comment
/test odf-console-e2e-aws |
LGTM @SanjalKatiyar to tag. |
/lgtm |
/test odf-console-e2e-aws |
/override ci/prow/odf-console-e2e-aws |
@SanjalKatiyar: Overrode contexts on behalf of SanjalKatiyar: ci/prow/odf-console-e2e-aws In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
/approve |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: SanjalKatiyar, TimothyAsirJeyasing, vbnrh The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
91ec798
into
red-hat-storage:master
/cherry-pick release-4.19 |
@TimothyAsirJeyasing: new pull request created: #2135 In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
https://issues.redhat.com/browse/DFBUGS-2822
https://issues.redhat.com/browse/DFBUGS-2823
This PR addresses issues related to the above BZs for deploying the CNV workload and protecting it via the Discovered application