-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[KEP-2568] Production Readiness Review. #2620
Conversation
Hi @vinayakankugoyal. Thanks for your PR. I'm waiting for a kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/cc @neolit123 |
/assign prod-readiness-approvers |
@vinayakankugoyal: GitHub didn't allow me to assign the following users: prod-readiness-approvers. Note that only kubernetes members, repo collaborators and people who have commented on this issue/PR can be assigned. Additionally, issues/PRs can only have 10 assignees at the same time. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/cc prod-readiness-approvers |
ea2f69a
to
446b196
Compare
Adding @ehashman for the PRR review. |
/cc @ehashman |
/assign |
@ehashman - I am new to the PRR process, so not sure how it goes. Does the PRR questionnaire seem ok? I am happy to provide more details. Thank you so much for looking at this KEP. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hi @vinayakankugoyal, not sure why the verify script isn't catching this. You will need to add a file to the keps/prod-readiness
directory for this KEP marking me as the approver. Because the KEP already merged I can't comment line-by-line. I'll do a review in my next comment.
Are these graduation criteria for alpha or beta? From the kep.yaml this appears to be a net new feature. I'm curious what the roadmap is supposed to look like for each of Alpha, Beta, and Graduated. (the latter two stages can be TBD/tentative)
Below I see there's a feature gate for all the control plane components to enable them to run as non-root, so I don't think this is correct. I don't think it's supported to run as non-root in version <1.22. If you have a mixed deployment X and X-1 (e.g. 1.22 and 1.21), it's possible you end up with some control plane components still running as root. Can you update this answer to clarify how that works?
The feature flags control the behaviour of each component. A feature flag in kube-apiserver won't affect kubeadm. How do the feature flags on each component affect their behaviour? What impact could it have on a cluster that wasn't deployed by kubeadm? Additionally, can you talk a little bit more about how enabling the feature flag will change kubeadm's behaviour, and what users should expect?
This question is missing an answer.
Is it possible to block or fail on the creation of users/groups? Should this be called out as a possible delay? |
Done. Thanks! |
These are graduation criteria for alpha. I think we'd come up with the Beta and Graduated criteria later, once we have hit alpha. (There wasn't a section for dev -> Alpha graduation criteria, so I put it under this section.)
The featuregate mentioned below is not a featuregate for the control-plane components but is a featuregate passed to kubeadm itself. It will control how kubeadm deploys the control-plane. Nothing in this design updates the feturegate flags passed to the control-plane binaries, the featuregate flag will be passed to the kubeadm binary itself and it will control how kubeadm updates the Pod config/manifest of the control-plane components. Sorry if this was not clear from my documentation.
The feature flag will not change the behavior of the control-plane components, it will change the behavior of kubeadm. kubeadm will configure the Pods of the components differently when this featuregate is enabled.
Added. Thanks!
Yes, it is possible to fail on the creation of users and groups. I'll call this out. |
@ehashman - Are there any more questions/concerns? I am happy to provide more details. Thank you so much for looking at this KEP. |
Because it appears that this enhancement is 100% out of tree (i.e. all changes made in k/kubeadm, no changes to k/kubernetes) I do not believe PRR approval is applicable. Pending confirmation from PRR team. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Per @johnbelamaric, please add a note that the PRR fields are not applicable, as this KEP is out of tree.
/approve
for PRR
Added the note in the check list and the PRR questionnaire section. |
/assign @neolit123 |
/lgtm lets move the discussion to the other PR that sets this KEP to implementable. |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: ehashman, neolit123, vinayakankugoyal The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
KEP-2568 proposes that we run the kubeadm control-plane as non-root and follow other security best practices.