-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Addon management layer #18
Comments
cc @kubernetes/sig-cluster-lifecycle @kubernetes/helm-maintainers |
cc @philips |
@mikedanese @errordeveloper Do you have any proposals for a new API, or should this be done via automation/helm or some other thing? At least I'd like to see a kubectl command (like @justinsb did), ideally the user could just toggle predefined (built-in) addons, or apply custom ones. |
@luxas so far the idea is to use Helm, and avoid creating new machinery. There would be a very thin layer on top of Helm, which would take some kind of object describing the list of addons (with optional parameters), such object would be supplied by preceding turnup phase. |
To be honest, I am little puzzled with the logistics of the next step, as the tick boxes above suggest I should create a formal proposal PR to the main repo, but seem more natural for this work to go ether into "kube-deploy" or a separate repo... thoughts? |
IMO, I think the repo for the proposal could go anywhere that makes sense - I think kube-deploy may be a bit out of date. On Mon, Jul 4, 2016 at 9:52 AM, Ilya Dmitrichenko notifications@github.com
|
Thanks, @aronchick 👍 |
The point of abstracting an addon manager is to reduce the duplicated effort across deployment automations that everyone goes through building addon management. It feels weird to shove the proposal in kubernetes-anywhere since this feature won't be implemented in kuberentes-anywhere. Can we find a centralized place to post design proposals? How about this repo? @pwittrock |
+1 to what @mikedanese says. We need to view this as a cross-cutting thing that isn't tied to any particular deployment tool. Note that we essentially have 2 types of addons. Ones that are pretty much necessary to make a cluster functional (DNS) and ones that are actually optional. I question using a tool like helm for the addons in the first category. It is a big dependency to take on for every kubernetes install and doing so would essentially bring it in to the "core". We should be able to find a lighter weight solution for deploying and managing DNS. |
Interesting - I hadn't thought of this to be the central place for Open to either suggestion. On Tue, Jul 5, 2016 at 9:21 AM, Joe Beda notifications@github.com wrote:
|
I would like people to be able to subscribe to kubernetes/features and see That will not be possible if there are design proposal PRs being discussed So, please not in this repo On Jul 5, 2016 9:41 AM, "David Aronchick" notifications@github.com wrote:
|
xref kubernetes/k8s.io#5 |
@errordeveloper @kubernetes/sig-cluster-lifecycle can you clarify the actual status of the feature? |
@errordeveloper @kubernetes/sig-cluster-lifecycle any update on this? |
This is a big deal, big need in the community. I would hope that we would use helm, since it is being used a ton. Happy to talk through use cases. |
@idvoretskyi all of us are just getting back from kubecon btw 😀 |
From reading kubernetes/kubernetes#29551, it seems this is going to use kubectl apply? |
@errordeveloper @kubernetes/sig-cluster-lifecycle does this feature target alpha, beta or stable for 1.5? |
If we have time for this in the v1.6 timeframe I think it will be alpha. @erictune Yes, basic manifest installation will be with kubectl apply, but we might consider a more advanced alternative as well (maybe using helm as the base, we haven't decided anything yet) |
The current release schedule is:
|
@justinsb Just a friendly reminder, we are just 7 days away from the Enhancement Freeze (Tuesday, January 28th). |
@justinsb Just a friendly reminder, we are just 2 days away from the Enhancement Freeze (3 PM Pacific Time, Tuesday, January 28th). |
Unfortunately, the deadline for the 1.18 Enhancement freeze has passed. For now, this is being removed from the milestone. If there is a need to get this in, please file an enhancement exception. |
formalize what a must-gather image includes
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
/remove-lifecycle stale |
Hey there @justinsb -- 1.19 Enhancements shadow here. I wanted to check in and see if you think this Enhancement will be graduating in 1.19? In order to have this part of the release:
The current release schedule is:
If you do, I'll add it to the 1.19 tracking sheet (http://bit.ly/k8s-1-19-enhancements). Once coding begins please list all relevant k/k PRs in this issue so they can be tracked properly. 👍 Thanks! |
Hi there @justinsb, Kind reminder about my question above. Regards, |
2 similar comments
Hi there @justinsb, Kind reminder about my question above. Regards, |
Hi there @justinsb, Kind reminder about my question above. Regards, |
Hey @justinsb , Enhancement shadow for the Regards, |
@justinsb -- Unfortunately the deadline for the 1.19 Enhancement freeze has passed. For now this is being removed from the milestone and 1.19 tracking sheet. If there is a need to get this in, please file an enhancement exception. |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
/remove-lifecycle stale |
Hi @justinsb Enhancements Lead here. Any plans for this in 1.20? Thanks, |
Hi @justinsb Any updates on this for 1.20? Enhancements Freeze is October 6th and by that time we require a merged KEP in an implementable state with test plans and graduation criteria. I currently don't see a related KEP for this. If you plan on this graduating in 1.20, please let me know. Best, |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Rotten issues close after 30d of inactivity. Send feedback to sig-contributor-experience at kubernetes/community. |
@fejta-bot: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Feature Description
# Description- Before Alpha
- Design Approval
- Design Proposal. This goes under docs/proposals. Doing a proposal as a PR allows line-by-line commenting from community, and creates the basis for later design documentation. Paste link to merged design proposal here:
- Proposal: Enable purging resources in
- Initial API review (if API). Maybe same PR as design doc. PR-NUMBER
- Any code that changes an API (
- cc @kubernetes/api
- Write (code + tests + docs) then get them merged. ALL-PR-NUMBERS
- Code needs to be disabled by default. Verified by code OWNERS
- Minimal testing
- Minimal docs
- cc @kubernetes/docs on docs PR
- cc @kubernetes/feature-reviewers on this issue to get approval before checking this off
- New apis: Glossary Section Item in the docs repo: kubernetes/kubernetes.github.io
- Update release notes
- Before Beta
- Testing is sufficient for beta
- User docs with tutorials
- Updated walkthrough / tutorial in the docs repo: kubernetes/kubernetes.github.io
- cc @kubernetes/docs on docs PR
- cc @kubernetes/feature-reviewers on this issue to get approval before checking this off
- Thorough API review
- cc @kubernetes/api
- Before Stable
- docs/proposals/foo.md moved to docs/design/foo.md
- cc @kubernetes/feature-reviewers on this issue to get approval before checking this off
- Soak, load testing
- detailed user docs and examples
- cc @kubernetes/docs
- cc @kubernetes/feature-reviewers on this issue to get approval before checking this off
- Once you get LGTM from a @kubernetes/feature-reviewers member, you can check this checkbox, and the reviewer will apply the "design-complete" label.
- Use as many PRs as you need. Write tests in the same or different PRs, as is convenient for you.
- As each PR is merged, add a comment to this issue referencing the PRs. Code goes in the http://github.com/kubernetes/kubernetes repository,
- When you are done with the code, apply the "code-complete" label.
- When the feature has user docs, please add a comment mentioning @kubernetes/feature-reviewers and they will
- Write user docs and get them merged in.
- User docs go into http://github.com/kubernetes/kubernetes.github.io.
- When the feature has user docs, please add a comment mentioning @kubernetes/docs.
- When you get LGTM, you can check this checkbox, and the reviewer will apply the "docs-complete" label.
Currently add-on management is baked in
kube-up.sh
and is subject to various kinds of issues. Current implementation lacks transparency, clear specification and any separation from other layers, among other more technical downsides. This part of the effort towards #11, and is a fairly easy one to tackle.As discussed in kubernetes-retired/kubernetes-anywhere#126, it looks like a low-hanging fruit, and existing projects can be easily used to pave the way. More specifically, the assumption is that Helm should work pretty well for this, and only a thin layer of automation would be required to make it seamless.
Progress Tracker
kubectl apply
kubernetes#29551/pkg/apis/...
)FEATURE_STATUS is used for feature tracking and to be updated by @kubernetes/feature-reviewers.
FEATURE_STATUS: IN_DEVELOPMENT
More advice:
Design
Coding
and sometimes http://github.com/kubernetes/contrib, or other repos.
check that the code matches the proposed feature and design, and that everything is done, and that there is adequate
testing. They won't do detailed code review: that already happened when your PRs were reviewed.
When that is done, you can check this box and the reviewer will apply the "code-complete" label.
Docs
The text was updated successfully, but these errors were encountered: