Skip to content

Commit 6e776c3

Browse files
Malewaresbernauer
andauthored
Apply formatting changes
Co-authored-by: Sebastian Bernauer <[email protected]>
1 parent b81d587 commit 6e776c3

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

modules/concepts/pages/operations/pod_disruptions.adoc

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,6 +123,7 @@ Have a look at the xref:contributor:adr/ADR030-allowed-pod-disruptions.adoc[ADR
123123
PDBs together with certificate rotations can be problematic in case e.g. {commons-operator}[commons-operator] was unavailable to restart the Pods before the certificate expire.
124124
commons-operator uses the `evict` API in Kubernetes, which respects the PDB.
125125
If a Pod is evicted and a PDB would be violated, the Pod is *not* restarted.
126+
126127
Assume a product like xref:zookeeper:index.adoc[Apache ZooKeeper] which needs to form a quorum to function and the PDB only allows a single Pod to be unavailable.
127128
As soon as enough certificates of the ZookeeperCluster have expired, all Pods will crash-loop, as they encounter expired certificates.
128129
As only the container crash-loops (not the entire Pod), no new certificate is issued.
@@ -132,7 +133,7 @@ However, this is prohibited, as the PDB would be violated.
132133
NOTE: We encountered this problem only with the specific outlined case above and only under this circumstances.
133134

134135
=== Workaround
135-
If you encounter this only manually deleting those pods can help out of this situation.
136+
If you encounter this, only manually deleting those pods can help you out of this situation.
136137
A Pod deletion (other than evictions) does *not* respect PDBs, so the Pods can be restarted anyway.
137138
All restarted Pods will get a new certificate, the stacklet should turn healthy again.
138139

0 commit comments

Comments
 (0)