Describe the bug: A clear and concise description of what the bug is.
- After provisioning NFS volume NFS-Provisioner will perform following steps:
- NFS-server resources like backend PVC, NFS-server deployment and NFS-server service.
- Once the creation is successfull provisioner will return NFS PV object and caller will create PV
object and bound to NFS PVC.
- If NFS-Provisoner is unhealthy after creating backend resources and meanwhile user deletes
the NFS-PVC then request will not reach provisoner since PVC is not yet bound in this case
stale resources will exist in the system.
Expected behaviour: A concise description of what you expected to happen
- Backend resources should be garbage collected after deleting NFS PVC irrespective
of PVC bound status.
Steps to reproduce the bug:
Steps to reproduce the bug should be clear and easily reproducible to help people gain an understanding of the problem
The output of the following commands will help us better understand what's going on:
kubectl get pods -n <openebs_namespace> --show-labels
kubectl get pvc -n <openebs_namespace>
kubectl get pvc -n <application_namespace>
Anything else we need to know?:
Add any other context about the problem here.
Environment details:
- OpenEBS version (use
kubectl get po -n openebs --show-labels):
- Kubernetes version (use
kubectl version):
- Cloud provider or hardware configuration:
- OS (e.g:
cat /etc/os-release):
- kernel (e.g:
uname -a):
- others:
Describe the bug: A clear and concise description of what the bug is.
object and bound to NFS PVC.
the NFS-PVC then request will not reach provisoner since PVC is not yet bound in this case
stale resources will exist in the system.
Expected behaviour: A concise description of what you expected to happen
of PVC bound status.
Steps to reproduce the bug:
Steps to reproduce the bug should be clear and easily reproducible to help people gain an understanding of the problem
The output of the following commands will help us better understand what's going on:
kubectl get pods -n <openebs_namespace> --show-labelskubectl get pvc -n <openebs_namespace>kubectl get pvc -n <application_namespace>Anything else we need to know?:
Add any other context about the problem here.
Environment details:
kubectl get po -n openebs --show-labels):kubectl version):cat /etc/os-release):uname -a):