-
Notifications
You must be signed in to change notification settings - Fork 76
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Bug]: UserAssignedIdentities and FederatedIdentityCredentials are not able to sync since v1.0.0 #740
Comments
More information:
On our side, we have created our own custom provider using the Azure SDK for Go directly and have implemented an optimisation (spec hash + save last external reconcile time) to reduce the quantity of external calls to a strict minimum in order to reduce the chance of hitting external rate limiting. MR states (left is our custom provider, right is the The first screenshot below is the work queue depth of Overall, I think the main point here would be to figure out how external rate limiting is handled in this provider and/or upjet and seeing if there's a better way of handling it. Hope this helps pinpoint the issue a little more. |
Related crossplane-runtime issue: crossplane/crossplane-runtime#696 Thanks again for all this data and insight @gravufo! 🙇♂️ |
This provider repo does not have enough maintainers to address every issue. Since there has been no activity in the last 90 days it is now marked as |
This issue is being closed since there has been no activity for 14 days since marking it as |
Is there an existing issue for this?
Affected Resource(s)
Resource MRs required to reproduce the bug
Steps to Reproduce
Apply >1000
UserAssignedIdentities
in Observe mode and let them get synced and ready using version v0.42.0.Then, upgrade the provider to v1.0.0 (or later) and watch the objects start becoming unsynced.
What happened?
We are getting a lot of errors with
context deadline exceeded
such as this:Also, we can see the
Synced
state of the objects dropping heavily and not being able to recover:Note that the FederatedIdentityCredentials also seem to be affected.
We did not see this behavior on a small scale (<10 objects) but consistently when the scale is in the thousands.
Relevant Error Output Snippet
No response
Crossplane Version
v1.15.2
Provider Version
v1.1.0
Kubernetes Version
v1.28.5
Kubernetes Distribution
AKS
Additional Info
I had created a thread in Slack here: https://crossplane.slack.com/archives/C019VE11LJJ/p1711905230102149
It may disappear if there is retention.
The text was updated successfully, but these errors were encountered: