Skip to content

Commit e2baa6f

Browse files
author
Pramodh Pallapothu
committed
Delete VMPersistentState support for EFI bootloader
When a EFI bootloader is started with persist state, a PVC is created with RWX mode by kubevirt upstream code. In eve-k we did not support RWX volumes yet since they require nfs server deployed and working. So since RWX volumes are not in good state, kubevirt virt-launcher pod keeps crashing every few hours which bounces the VMs. Ideally virt-launcher should error out not segfault if volumes are not accessible, thats a kubevirt bug and I reported this issue to the community and they are working on it. Until that issue is fixed, disable the persist state. Signed-off-by: Pramodh Pallapothu <[email protected]>
1 parent a635177 commit e2baa6f

File tree

2 files changed

+1
-3
lines changed

2 files changed

+1
-3
lines changed

pkg/kube/kubevirt-features.yaml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,6 @@ metadata:
66
namespace: kubevirt
77
spec:
88
configuration:
9-
vmStateStorageClass: longhorn
109
permittedHostDevices:
1110
pciHostDevices: # <- PCIe passthrough devices like nvme drives/NIC
1211
mediatedDevices: # <- GPUs
@@ -18,4 +17,3 @@ spec:
1817
- Snapshot
1918
- HostDevices
2019
- GPU
21-
- VMPersistentState

pkg/pillar/hypervisor/kubevirt.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1863,7 +1863,7 @@ func addEFIBootLoader(spec *v1.VirtualMachineInstanceSpec) {
18631863
spec.Domain.Firmware.Bootloader = &v1.Bootloader{
18641864
EFI: &v1.EFI{
18651865
SecureBoot: ptrBool(false), // For this we need SMM CPU feature enabled
1866-
Persistent: ptrBool(true),
1866+
Persistent: ptrBool(false),
18671867
},
18681868
}
18691869
}

0 commit comments

Comments
 (0)