Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Create availability policy for reference images, so we can prune them #2114

Closed
mboersma opened this issue Feb 23, 2022 · 0 comments · Fixed by #2126
Closed

Create availability policy for reference images, so we can prune them #2114

mboersma opened this issue Feb 23, 2022 · 0 comments · Fixed by #2126
Labels
kind/feature Categorizes issue or PR as related to a new feature.

Comments

@mboersma
Copy link
Contributor

/kind feature

Describe the solution you'd like

CAPZ documentation should make clear that the project provides reference images only for the last X patch releases of Kubernetes, for each of the last Y minor releases. Then maintainers should prune our stored images down to those covered by the availability policy.

Background

To facilitate tests, and to help new users kick the tires, the CAPZ project has published reference images for each version of Kubernetes released over the last couple years. But there are costs associated with keeping the entire set of reference images available.

The number of images involved has become quite large and poses some challenges for Azure's Marketplace. We run into issues frequently due to the size of the overall offer. We are also billed for the amount of storage used, which continues to grow.

Additionally, these images are for testing and reference. They aren't "supported" in the sense that Azure usually supports its services and binary artifacts. They are not updated with OS-level security patches, and many Kubernetes releases remain there after they have been effectively obsoleted by newer versions with CVE fixes.

The danger is that even with making the availability policy clear and taking a deliberate approach to removing old images (such as Kubernetes 1.16.10!), there may be users who depend on a particular image and are surprised. Since these images were never supported, and we have made clear that after a trial phase, users need to maintain their own images, I think we are covered. But I would love any other suggestions to help avoid this.

Anything else you would like to add:

@k8s-ci-robot k8s-ci-robot added the kind/feature Categorizes issue or PR as related to a new feature. label Feb 23, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/feature Categorizes issue or PR as related to a new feature.
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants