-
Notifications
You must be signed in to change notification settings - Fork 634
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Proposing Keptn to become an Incubation project #670
Conversation
Signed-off-by: jetzlstorfer <[email protected]>
Signed-off-by: jetzlstorfer <[email protected]>
Signed-off-by: jetzlstorfer <[email protected]>
Signed-off-by: jetzlstorfer <[email protected]>
Signed-off-by: jetzlstorfer <[email protected]>
Signed-off-by: Johannes <[email protected]>
Signed-off-by: Johannes <[email protected]>
Signed-off-by: Johannes <[email protected]>
Update of feature set, roadmap, and fixed typos
Signed-off-by: Johannes <[email protected]>
Added an additional block to the roadmap
Signed-off-by: jetzlstorfer <[email protected]>
Signed-off-by: jetzlstorfer <[email protected]>
Signed-off-by: Johannes <[email protected]>
Signed-off-by: Johannes <[email protected]>
Added a paragraph about Keptn CloudEvents
Signed-off-by: jetzlstorfer <[email protected]>
Signed-off-by: jetzlstorfer <[email protected]>
Signed-off-by: jetzlstorfer <[email protected]>
Signed-off-by: jetzlstorfer <[email protected]>
Signed-off-by: jetzlstorfer <[email protected]>
Signed-off-by: jetzlstorfer <[email protected]>
Signed-off-by: jetzlstorfer <[email protected]>
Signed-off-by: jetzlstorfer <[email protected]>
Signed-off-by: jetzlstorfer <[email protected]>
Signed-off-by: jetzlstorfer <[email protected]>
Signed-off-by: jetzlstorfer <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Could you provide a link to a resource that fulfills the following requirement of the Incubating Stage - "Clearly documented security processes explaining how to report security issues to the project, and describing how the project provides updated releases or patches to resolve security vulnerabilities". Thanks!
|
||
### Have a healthy number of committers | ||
|
||
Keptn currently has contributions from [more than 15 different organizations](https://keptn.devstats.cncf.io/d/5/companies-table?orgId=1&var-period_name=Last%20decade&var-metric=commits) and a [total of 50+ individual contributors](https://github.com/keptn/keptn/graphs/contributors) to the core project. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Were these contributions in the form of commits on Github? I have looked at the closed PRs (currently at 2,794) and over 2000 are from one organization (Dynatrace) + Robots. Could you give me a few examples of collaborations within different orgs/community?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is based on the official statistics from CNCF devstats. It is true that most contributions are affiliated with Dynatrace, however, the project has profound contributions by other companies including ERT, Garner Cop, ChaosNative/LitmusChaos, VMWare, and Kitopi as well.
I am referencing some PRs from different organizations that have been substantially contributing to the project:
- support for external MongoDB submitted by Kitopi Update control-plane charts with parameters for external mongodb keptn/keptn#2842
- hardening of naming conventions submitted by Mattermost shipyard-controller: check service name lenght to not be bigger than 53 chars keptn/keptn#3005
- contributions for improving the Prometheus integration by LitmusChaos contributors (list of PRs) https://github.com/keptn-contrib/prometheus-service/pulls?q=is%3Apr+author%3Arajdas98
- contributions to the Keptn CLI by LitmusChaos contributors (list of PRs) https://github.com/keptn/keptn/pulls?q=is%3Apr+author%3ADarthBenro008+
- contributions on Keptn API and CLI by ERT (list of PRs) https://github.com/keptn/keptn/pulls?q=is%3Apr+author%3Acheckelmann+is%3Aclosed
- improvements to Helm charts of Keptn by Absa (list of PRs) https://github.com/keptn/keptn/pulls?q=is%3Apr+author%3Adonovanmuller+is%3Aclosed
|
||
### Document that it is being used successfully in production by at least three independent end users which, in the TOC’s judgement, are of adequate quality and scope | ||
|
||
1. [Schlumberger](https://slb.com/), an oilfield services company working in more than 120 countries, has currently 4 applications evaluated with Keptn quality gates. Evaluations make use of 10-20 SLIs, one of them even 90 SLIs per quality gate evaluation. Their integration triggers Keptn quality gates via Azure DevOps automation daily. It has been [presented it in a Keptn user group](https://youtu.be/9YYjk1e9ZGE). |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Re Schlumberger - According to the definition of end-user, I’m not sure Schlumberger qualifies under "but do not sell any cloud native services externally", given they are also a Software vendor: https://partners.amazonaws.com/partners/001E000000xHbWRIA0/Schlumberger https://www.slb.com/newsroom/press-release/2021/pr-2021-0629-slb-ibm-osdu
I emailed [email protected]
and will verify with the TOC if that's the case.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I verified and this submission has at least three other companies that I would qualify as end users, so the project is still fulfilling this requirement.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Verified that Schlumberger here qualifies as an end user. 👍
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I've responded but just to follow up here, the definition of end-user is only applied for CNCF members.
Here, what's needed is adopters of the project, and the video's a good example.
Hi @Jenniferstrej please find our security process here https://github.com/keptn/keptn/blob/master/SECURITY.md and our published vulnerability bulletins can be found here https://keptn.sh/docs/news/vulnerability_bulletins/ |
Due diligence document: https://docs.google.com/document/d/14qFAc6kxhWX_JLMUKddgELcymaRw6jmhsq0OYxrHtc0/edit# |
I will be TOC sponsor. Will begin post Kubecon |
Hi @cdavisafc! Just to follow up on the emails I've sent, I will be coordinating this proposal on the Keptn community side. It would be great to sync-up with you and check the current status together. I see the formal incubation requirements but I'm not yet familiar with the CNCF practices |
Just a few updates to address the topics brought up during the previous conversations with the TOC:
|
Appreciated guys! Thanks for the open source SRE tool |
This is a proposal to consider Keptn as a CNCF Incubation project.
Since joining the CNCF Sandbox, Keptn has made substantial progress in various dimensions, including user adoption, feature set, ecosystem growth, and community growth, as described in detail in the proposal document.
If anything is missing, please let me know and I'm happy to provide more details!