-
Notifications
You must be signed in to change notification settings - Fork 1.5k
KEP-4004: change from provisional to implementable #4199
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
KEP-4004: change from provisional to implementable #4199
Conversation
cc @HirazawaUi |
Thanks! |
Queued - will take a look later this week. |
# of http://git.k8s.io/enhancements/OWNERS_ALIASES | ||
kep-number: 4004 | ||
alpha: | ||
approver: "@wojtek-t" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Few comments:
-
High-level question: for an existing node with the field set, after enabling feature-gate will kubelet set the field to empty?
Can you add an answer to this question explicitly to the KEP (in proposal section I guess)? -
Testing strategy:
- the test I would additionally like to see (I guess it may be manual and it could probably be the one that would be effective the test in https://github.com/kubernetes/enhancements/tree/master/keps/sig-network/4004-deprecate-kube-proxy-version#were-upgrade-and-rollback-tested-was-the-upgrade-downgrade-upgrade-path-tested ) is a test that ensures that after I disable the FG the field will be again propagated.
- Feature gates:
- just double checking - won't kube-apiserver also depend on the FG? [I think it shouldn't and if someone sets the field it should accept it, but wanted to double check]
- feature enablement/disablement tests
I only partially agree with the answer - I have two concerns:
- depending on the answer to my (0) question - we may want to actually verify if kubelet zero's the field
- independently of everything, I would like to see some test that ensures that after disablement of the FG (given the reason of that will most probably be "oops, something still depends on it"), ensure that this will actually be set
[I will have some additional comments for Beta, but I want to unblock Alpha first :) ]
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
* just double checking - won't kube-apiserver also depend on the FG? [I think it shouldn't and if someone sets the field it should accept it, but wanted to double check]
We weren't planning to actually block access to the field. Just to have kubelet stop setting it. So no apiserver involvement.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
- for an existing node with the field set, after enabling feature-gate will kubelet set the field to empty
I think with feature-gate enabled, the kubelet sets the fields to empty.
fad8ca3
to
8214c39
Compare
updated |
/approve PRR /assign @thockin |
/lgtm |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks!
/lgtm
/approve
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: aojea, danwinship, thockin, wojtek-t The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
node.status.kubeProxyVersion
) got merged as "provisional" rather than "implementable". This just fixes that. (Meaning it needs PRR approval now.)/assign @wojtek-t