From c02fb479dce1a6b5509c61d60224be5fb34133d3 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Le=C3=AFla=20MARABESE?= Date: Tue, 29 Aug 2023 16:29:08 +0200 Subject: [PATCH] reconcile instancegroup --- pkg/instancegroups/instancegroups.go | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/pkg/instancegroups/instancegroups.go b/pkg/instancegroups/instancegroups.go index 231b633ee1a14..5ce6f925bce01 100644 --- a/pkg/instancegroups/instancegroups.go +++ b/pkg/instancegroups/instancegroups.go @@ -442,7 +442,9 @@ func (c *RollingUpdateCluster) drainTerminateAndWait(u *cloudinstances.CloudInst } // GCE often re-uses names, so we delete the node object to prevent the new instance from using the cordoned Node object - if c.Cluster.Spec.GetCloudProvider() == api.CloudProviderGCE && !isBastion && !c.CloudOnly { + // Scaleway has the same behavior + if (c.Cluster.Spec.GetCloudProvider() == api.CloudProviderGCE || c.Cluster.Spec.GetCloudProvider() == api.CloudProviderScaleway) && + !isBastion && !c.CloudOnly { if u.Node == nil { klog.Warningf("no kubernetes Node associated with %s, skipping node deletion", instanceID) } else { @@ -473,6 +475,7 @@ func (c *RollingUpdateCluster) drainTerminateAndWait(u *cloudinstances.CloudInst func (c *RollingUpdateCluster) reconcileInstanceGroup() error { if c.Cluster.Spec.GetCloudProvider() != api.CloudProviderOpenstack && c.Cluster.Spec.GetCloudProvider() != api.CloudProviderHetzner && + c.Cluster.Spec.GetCloudProvider() != api.CloudProviderScaleway && c.Cluster.Spec.GetCloudProvider() != api.CloudProviderDO { return nil }