Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

KEP-2133: add beta milestone and prod readiness review #2457

Merged
merged 3 commits into from
Feb 9, 2021

Conversation

andrewsykim
Copy link
Member

Adding beta milestone and beta requirements for PRR for the Kubelet Credential Provider KEP.

Signed-off-by: Andrew Sy Kim kim.andrewsy@gmail.com

@k8s-ci-robot k8s-ci-robot added the cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. label Feb 8, 2021
@k8s-ci-robot k8s-ci-robot added kind/kep Categorizes KEP tracking issues and PRs modifying the KEP directory sig/node Categorizes an issue or PR as relevant to SIG Node. size/M Denotes a PR that changes 30-99 lines, ignoring generated files. labels Feb 8, 2021
@andrewsykim
Copy link
Member Author

/assign @derekwaynecarr @deads2k

@@ -22,12 +22,12 @@ replaces:
- "/keps/sig-cloud-provider/20191004-out-of-tree-credential-providers.md"

# The target maturity stage in the current dev cycle for this KEP.
stage: alpha
stage: beta
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.


* **What specific metrics should inform a rollback?**

TBD for beta.
This feature does not have metrics.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Metrics for how a credential exec plugin is performing seems pretty reasonable and low cardinality. And it would be used to inform how well this feature and the exec plugin itself are working.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

That's fair, I'll add something about this


* **Is the rollout accompanied by any deprecations and/or removals of features, APIs,
fields of API types, flags, etc.?**

TBD for beta.
Yes, this feature was added to remove the in-tree kubelet credential providers for AWS, Azure and GCP.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

without metrics on performance and reliability of the exec plugin flow, how will these providers have confidence that they can move?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

added metrics

- [ ] Other (treat as last resort)
- Details:
- [X] Other (treat as last resort)
- Details: the kubelet has several error-level logs for when exec plugins time out or return a non-zero exit code.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This seems like a reasonable metric to build.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

added metrics

@deads2k
Copy link
Contributor

deads2k commented Feb 8, 2021

the exact metric names and labels can be finessed during implementation, but the intent here is clear now. Thanks.

/lgtm
/approve

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Feb 8, 2021
@k8s-ci-robot k8s-ci-robot removed the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Feb 8, 2021
@deads2k
Copy link
Contributor

deads2k commented Feb 8, 2021

/lgtm

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Feb 8, 2021
@ehashman ehashman mentioned this pull request Feb 8, 2021
4 tasks
@derekwaynecarr
Copy link
Member

The original graduation criteria had specified at least one working plugin implementation. Is there a specific working plugin implementation that we are targeting for integration with e2e test? The rest of this PR looks fine to me.

@andrewsykim
Copy link
Member Author

@derekwaynecarr yes the ECR plugin has been merged a couple months back (https://github.com/kubernetes/cloud-provider-aws/tree/master/cmd/ecr-credential-provider) and we are hoping that will go through some testing prior to promoting this feature to beta.

Signed-off-by: Andrew Sy Kim <kim.andrewsy@gmail.com>
Signed-off-by: Andrew Sy Kim <kim.andrewsy@gmail.com>
Signed-off-by: Andrew Sy Kim <kim.andrewsy@gmail.com>
@k8s-ci-robot k8s-ci-robot removed the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Feb 9, 2021
@derekwaynecarr
Copy link
Member

/approve
/lgtm

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Feb 9, 2021
@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: andrewsykim, deads2k, derekwaynecarr

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Feb 9, 2021
@k8s-ci-robot k8s-ci-robot merged commit 155acc0 into kubernetes:master Feb 9, 2021
@k8s-ci-robot k8s-ci-robot added this to the v1.21 milestone Feb 9, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. kind/kep Categorizes KEP tracking issues and PRs modifying the KEP directory lgtm "Looks good to me", indicates that a PR is ready to be merged. sig/node Categorizes an issue or PR as relevant to SIG Node. size/M Denotes a PR that changes 30-99 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

5 participants