Skip to content

Conversation

@javidiaz
Copy link
Contributor

@javidiaz javidiaz commented Sep 1, 2020

This update should contain all information required for the KEP to be able to graduate the feature to at least beta.

@k8s-ci-robot k8s-ci-robot added the cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. label Sep 1, 2020
@k8s-ci-robot
Copy link
Contributor

Hi @javidiaz. Thanks for your PR.

I'm waiting for a kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@k8s-ci-robot k8s-ci-robot added needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. size/L Denotes a PR that changes 100-499 lines, ignoring generated files. labels Sep 1, 2020
@k8s-ci-robot k8s-ci-robot added kind/kep Categorizes KEP tracking issues and PRs modifying the KEP directory sig/architecture Categorizes an issue or PR as relevant to SIG Architecture. sig/node Categorizes an issue or PR as relevant to SIG Node. labels Sep 1, 2020
@javidiaz
Copy link
Contributor Author

javidiaz commented Sep 1, 2020

/cc @dashpole @marosset @thockin

@javidiaz
Copy link
Contributor Author

javidiaz commented Sep 1, 2020

/assign @dchen1107

- [X] (R) Test plan is in place, giving consideration to SIG Architecture and SIG Testing input
- [X] (R) Graduation criteria is in place
- [X] (R) Production readiness review completed
- [ ] Production readiness review approved
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Did you ever get a PRR reviewer for this?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

No. I was confused about the the review completed and approved. So I checked it because I completed the questionnaire for readiness review.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It looks like it still isn't strictly required: https://github.com/kubernetes/community/blob/master/sig-architecture/production-readiness.md#status, but it would be good to get someone to take a look.

cc @prod-readiness-approvers

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks, let me ask in the prod-readiness channel.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

That cc didn't appear to work.

cc @wojtek-t

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

i think it needs slash?
/cc @wojtek-t

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sorry for large delay - looking into it now.

[And starting 1.20 we will require prod readiness to be approved by PRR team.]

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@wojtek-t Should I update this PR with an X in "Production readiness review approved"? or is this typically done by you guys after this merges?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes - feel free to mark it.

@javidiaz javidiaz force-pushed the fqdn-hostname-kep-update branch from ebc1411 to c5f6e02 Compare September 1, 2020 19:06
@danwinship
Copy link
Contributor

/retitle Update FQDN Hostname KEP to beta

@k8s-ci-robot k8s-ci-robot changed the title Updating KEP to promote feature to Beta Update FQDN Hostname KEP to beta Sep 2, 2020
@wojtek-t wojtek-t self-assigned this Sep 2, 2020
@javidiaz
Copy link
Contributor Author

e2e tests have been successfully running for a while now in the testgrid https://k8s-testgrid.appspot.com/sig-node-kubelet#node-kubelet-alpha

Can I have some eyes on this review please? I also need ok-to-test. thanks!

@marosset
Copy link
Contributor

/ok-to-test

@k8s-ci-robot k8s-ci-robot added ok-to-test Indicates a non-member PR verified by an org member that is safe to test. and removed needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. labels Sep 16, 2020
@javidiaz javidiaz force-pushed the fqdn-hostname-kep-update branch from 6413d77 to 9730f51 Compare September 17, 2020 14:26
This issue will be logged in Error level log messages. The error will something like`GeneratePodSandboxConfig for pod foo failed: Failed to construct FQDN from pod hostname and cluster domain, FQDN <long-fqdn> is too long (64 characters is the max, 70 characters requested)`

- Testing: Are there any tests for failure mode? If not describe why.
Unittests cover this failure scenario. The e2e tests also check for this error, but only as protection for the CI. A test that purposely hit this issue will be flaky as the pod will remain in Pending status logging errors until the test timesout.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't understand this - why the test should be flaky?

The test could be:

  • create a pod (that would exceed this limit)
  • watch for events and ensure the even for fdqn is delivered
  • once event is delivered, delete the pod

We have similar kind of tests and I don't think they are really flaky.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Oh ok, I will try to make one like you suggest.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Cool. Once done, please update this part here.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please update - the "flaky" part doesn't make sense to me (as I wrote above). You can describe that test in testing section or sth like that.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes, I will update the section saying e2e also covers failure mode so I don't forget.
However, I am still working to get the e2e test right, I am working based on an AppArmor e2e test I found, i think it does what you suggested. kubernetes/kubernetes#95187

@javidiaz javidiaz force-pushed the fqdn-hostname-kep-update branch from aa972c7 to 5194498 Compare September 18, 2020 22:02
This issue will be logged in Error level log messages. The error will something like`GeneratePodSandboxConfig for pod foo failed: Failed to construct FQDN from pod hostname and cluster domain, FQDN <long-fqdn> is too long (64 characters is the max, 70 characters requested)`

- Testing: Are there any tests for failure mode? If not describe why.
Unittests cover this failure scenario. The e2e tests also check for this error, but only as protection for the CI. A test that purposely hit this issue will be flaky as the pod will remain in Pending status logging errors until the test timesout.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Cool. Once done, please update this part here.

@javidiaz javidiaz force-pushed the fqdn-hostname-kep-update branch from 5194498 to 104a792 Compare September 29, 2020 22:47
Copy link
Member

@wojtek-t wojtek-t left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Just some minor final comments - other than those LGTM.

This issue will be logged in Error level log messages. The error will something like`GeneratePodSandboxConfig for pod foo failed: Failed to construct FQDN from pod hostname and cluster domain, FQDN <long-fqdn> is too long (64 characters is the max, 70 characters requested)`

- Testing: Are there any tests for failure mode? If not describe why.
Unittests cover this failure scenario. The e2e tests also check for this error, but only as protection for the CI. A test that purposely hit this issue will be flaky as the pod will remain in Pending status logging errors until the test timesout.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please update - the "flaky" part doesn't make sense to me (as I wrote above). You can describe that test in testing section or sth like that.

@javidiaz javidiaz force-pushed the fqdn-hostname-kep-update branch from 104a792 to 8c78dc7 Compare September 30, 2020 13:53
@wojtek-t
Copy link
Member

/lgtm

@dchen1107 - can you please approve?

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Sep 30, 2020
reviewers:
- "@thockin"
- "@marosset"
- "@dashpole"
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@dashpole is concentrated on instrumentation part of the k8s now. Maybe this name can be used for historical perspective for alpha version review.

@SergeyKanzhelev
Copy link
Member

/lgtm

@k8s-ci-robot k8s-ci-robot removed the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Oct 1, 2020
Copy link
Member

@wojtek-t wojtek-t left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@javidiaz - please also squash commits

- [X] (R) Test plan is in place, giving consideration to SIG Architecture and SIG Testing input
- [X] (R) Graduation criteria is in place
- [X] (R) Production readiness review completed
- [ ] Production readiness review approved
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes - feel free to mark it.

@dchen1107
Copy link
Member

/lgtm
/approve

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Oct 2, 2020
@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: dchen1107, javidiaz

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Oct 2, 2020
@k8s-ci-robot k8s-ci-robot merged commit 78ff496 into kubernetes:master Oct 2, 2020
@k8s-ci-robot k8s-ci-robot added this to the v1.20 milestone Oct 2, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. kind/kep Categorizes KEP tracking issues and PRs modifying the KEP directory lgtm "Looks good to me", indicates that a PR is ready to be merged. ok-to-test Indicates a non-member PR verified by an org member that is safe to test. sig/architecture Categorizes an issue or PR as relevant to SIG Architecture. sig/node Categorizes an issue or PR as relevant to SIG Node. size/L Denotes a PR that changes 100-499 lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

8 participants