Skip to content

Commit b956dfa

Browse files
authored
Merge pull request #2785 from Nordix/update-log-capi
🌱Update log verbosity level according to CAPI
2 parents 28aae17 + 8d283f8 commit b956dfa

File tree

5 files changed

+16
-16
lines changed

5 files changed

+16
-16
lines changed

controllers/openstackserver_controller.go

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -325,7 +325,7 @@ func (r *OpenStackServerReconciler) reconcileNormal(ctx context.Context, scope *
325325
// that in the delete path we can be sure that if there are no resolved
326326
// resources then no resources were created.
327327
if changed {
328-
scope.Logger().V(6).Info("Server resources updated, requeuing")
328+
scope.Logger().V(5).Info("Server resources updated, requeuing")
329329
return ctrl.Result{}, nil
330330
}
331331

@@ -716,10 +716,10 @@ func OpenStackServerReconcileComplete(log logr.Logger) predicate.Funcs {
716716
log = log.WithValues("OpenStackServer", klog.KObj(server))
717717

718718
if server.Status.Ready || IsServerTerminalError(server) {
719-
log.V(6).Info("OpenStackServer finished reconciling, allowing further processing")
719+
log.V(5).Info("OpenStackServer finished reconciling, allowing further processing")
720720
return true
721721
}
722-
log.V(6).Info("OpenStackServer is still reconciling, blocking further processing")
722+
log.V(5).Info("OpenStackServer is still reconciling, blocking further processing")
723723
return false
724724
},
725725
UpdateFunc: func(e event.UpdateEvent) bool {
@@ -741,7 +741,7 @@ func OpenStackServerReconcileComplete(log logr.Logger) predicate.Funcs {
741741
oldFinished := oldServer.Status.Ready || IsServerTerminalError(oldServer)
742742
newFinished := newServer.Status.Ready || IsServerTerminalError(newServer)
743743
if !oldFinished && newFinished {
744-
log.V(6).Info("OpenStackServer finished reconciling, allowing further processing")
744+
log.V(5).Info("OpenStackServer finished reconciling, allowing further processing")
745745
return true
746746
}
747747

pkg/cloud/services/compute/instance_types.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -157,7 +157,7 @@ func (is *InstanceStatus) NetworkStatus() (*InstanceNetworkStatus, error) {
157157
case "fixed":
158158
addressType = corev1.NodeInternalIP
159159
default:
160-
is.logger.V(6).Info("Ignoring address with unknown type", "address", address.Address, "type", address.Type)
160+
is.logger.V(5).Info("Ignoring address with unknown type", "address", address.Address, "type", address.Type)
161161
continue
162162
}
163163
if address.Version == 4 {

pkg/cloud/services/networking/network.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,7 @@ func (s *Service) ReconcileNetwork(openStackCluster *infrav1.OpenStackCluster, c
109109
openStackCluster.Status.Network.ID = res.ID
110110
openStackCluster.Status.Network.Name = res.Name
111111
openStackCluster.Status.Network.Tags = res.Tags
112-
s.scope.Logger().V(6).Info("Reusing existing network", "name", res.Name, "id", res.ID)
112+
s.scope.Logger().V(5).Info("Reusing existing network", "name", res.Name, "id", res.ID)
113113
return nil
114114
}
115115

@@ -201,7 +201,7 @@ func (s *Service) ReconcileSubnet(openStackCluster *infrav1.OpenStackCluster, cl
201201
}
202202
} else if len(subnetList) == 1 {
203203
subnet = &subnetList[0]
204-
s.scope.Logger().V(6).Info("Reusing existing subnet", "name", subnet.Name, "id", subnet.ID)
204+
s.scope.Logger().V(5).Info("Reusing existing subnet", "name", subnet.Name, "id", subnet.ID)
205205

206206
if err := s.updateSubnetDNSNameservers(openStackCluster, subnet); err != nil {
207207
return err

pkg/cloud/services/networking/securitygroups.go

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@ func (s *Service) ReconcileSecurityGroups(openStackCluster *infrav1.OpenStackClu
9999
if err != nil {
100100
return err
101101
}
102-
s.scope.Logger().V(6).Info("Updated tags for security group", "name", group.Name, "id", group.ID)
102+
s.scope.Logger().V(5).Info("Updated tags for security group", "name", group.Name, "id", group.ID)
103103
}
104104
}
105105

@@ -471,7 +471,7 @@ func (s *Service) reconcileGroupRules(desired *securityGroupSpec, observed *grou
471471
if len(rulesToDelete) > 0 {
472472
s.scope.Logger().V(4).Info("Deleting rules not needed anymore for group", "name", observed.Name, "amount", len(rulesToDelete))
473473
for _, rule := range rulesToDelete {
474-
s.scope.Logger().V(6).Info("Deleting rule", "ID", rule, "name", observed.Name)
474+
s.scope.Logger().V(5).Info("Deleting rule", "ID", rule, "name", observed.Name)
475475
err := s.client.DeleteSecGroupRule(rule)
476476
if err != nil {
477477
return err
@@ -502,17 +502,17 @@ func (s *Service) getOrCreateSecurityGroup(openStackCluster *infrav1.OpenStackCl
502502
return nil, err
503503
}
504504
if secGroup != nil {
505-
s.scope.Logger().V(6).Info("Reusing existing SecurityGroup", "name", groupName, "id", secGroup.ID)
505+
s.scope.Logger().V(5).Info("Reusing existing SecurityGroup", "name", groupName, "id", secGroup.ID)
506506
return secGroup, nil
507507
}
508508

509-
s.scope.Logger().V(6).Info("Group doesn't exist, creating it", "name", groupName)
509+
s.scope.Logger().V(5).Info("Group doesn't exist, creating it", "name", groupName)
510510

511511
createOpts := groups.CreateOpts{
512512
Name: groupName,
513513
Description: "Cluster API managed group",
514514
}
515-
s.scope.Logger().V(6).Info("Creating group", "name", groupName)
515+
s.scope.Logger().V(5).Info("Creating group", "name", groupName)
516516

517517
group, err := s.client.CreateSecGroup(createOpts)
518518
if err != nil {
@@ -529,7 +529,7 @@ func (s *Service) getSecurityGroupByName(name string) (*groups.SecGroup, error)
529529
Name: name,
530530
}
531531

532-
s.scope.Logger().V(6).Info("Attempting to fetch security group with", "name", name)
532+
s.scope.Logger().V(5).Info("Attempting to fetch security group with", "name", name)
533533
allGroups, err := s.client.ListSecGroup(opts)
534534
if err != nil {
535535
return nil, err
@@ -561,7 +561,7 @@ func (s *Service) createRule(securityGroupID string, r resolvedSecurityGroupRule
561561
RemoteIPPrefix: r.RemoteIPPrefix,
562562
SecGroupID: securityGroupID,
563563
}
564-
s.scope.Logger().V(6).Info("Creating rule", "description", r.Description, "direction", dir, "portRangeMin", r.PortRangeMin, "portRangeMax", r.PortRangeMax, "proto", proto, "etherType", etherType, "remoteGroupID", r.RemoteGroupID, "remoteIPPrefix", r.RemoteIPPrefix, "securityGroupID", securityGroupID)
564+
s.scope.Logger().V(5).Info("Creating rule", "description", r.Description, "direction", dir, "portRangeMin", r.PortRangeMin, "portRangeMax", r.PortRangeMax, "proto", proto, "etherType", etherType, "remoteGroupID", r.RemoteGroupID, "remoteIPPrefix", r.RemoteIPPrefix, "securityGroupID", securityGroupID)
565565
_, err := s.client.CreateSecGroupRule(createOpts)
566566
if err != nil {
567567
return err

pkg/scope/provider.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -171,7 +171,7 @@ func NewCachedProviderScope(cache *cache.LRUExpireCache, cloud clientconfig.Clou
171171
}
172172

173173
if scope, found := cache.Get(key); found {
174-
logger.V(6).Info("Using scope from cache")
174+
logger.V(5).Info("Using scope from cache")
175175
return scope.(Scope), nil
176176
}
177177

@@ -272,7 +272,7 @@ func NewProviderClient(cloud clientconfig.Cloud, regionName string, caCert []byt
272272
}
273273

274274
provider.HTTPClient.Transport = &http.Transport{Proxy: http.ProxyFromEnvironment, TLSClientConfig: config}
275-
if klog.V(6).Enabled() {
275+
if klog.V(5).Enabled() {
276276
provider.HTTPClient.Transport = &osclient.RoundTripper{
277277
Rt: provider.HTTPClient.Transport,
278278
Logger: &gophercloudLogger{logger},

0 commit comments

Comments
 (0)