-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
StorageObjectInUseProtection (was Persistent Volume Protection) #499
Comments
/assign |
This feature aims to fix the bug: kubernetes/kubernetes#33355 |
This did not make it in to 1.9, punting to next release |
/assign |
@NickrenREN has taken over development of this feature. @NickrenREN will you, please, comment on the status of the development of this feature. |
Yeah, on track for 1.10. I am writing the proposal . will send it out tomorrow. |
added 1.10 milestone |
@NickrenREN do we need additional doc for this feature? If so, please submit PR as soon as possible. Either way, please update the 1.10 feature tracking spreadsheet |
The PR is here, but I think needs to be updated to use the new name of the admission controller: |
@msau42 admission controller name is being updated here: https://github.com/kubernetes/website/pull/7576/files |
Correct me if I am wrong but this feature skipped alpha and went directly to beta because it piggy backed on the work done for #498. Changing labels to reflect that. |
@pospispa I am the CI Signal lead for 1.11 and also work on Conformance testing program for K8s. I see this feature is going to Stable in 1.11. |
@AishSundar there're 2 E2E tests for the Storage Object In Use Protection feature:
IMHO, both E2E tests should be added to Conformance suite. Please, what am I supposed to do now? |
@pospispa if you/owning SIG determine that these tests should be part of Conformance (for base profile) then the next step is to send a PR to promote the test to Conformance suite. Here's a sample PR
Lastly Code freeze for v1.11 is 6/5, so we should ideally aim for the PR to be merged by then. cc @jagosan @mithrav as FYI |
cc @timothysc as FYI |
Are PVCs and dynamic provisioning currently part of conformance? |
@msau42 I dont see them in current Conformance suite - https://k8s-testgrid.appspot.com/conformance-all#GCE,%20master%20(dev) |
@pospispa I had a chance to talk to 1.11 RT about this PR. Considering we will be entering CodeFreeze next Tuesday, 6/5, we should ideally aim for the promotion PR to be reviewed and merge by EOD Thursday 5/31 for this to make into 1.11. We will then have time for a couple of test runs before code freeze and branch cut. Please let me know if you think this can be wrapped by Thursday. Thanks. |
I spoke with @saad-ali briefly about adding this to the conformance suite. We're not sure dynamic provisioning in general can be supported in conformance because it requires vendor-specific volume plugins to work. |
@bgrant0607 for some guidance on adding this scenario to Conformance suite. |
cc @bgrant0607 |
There are multiple issues:
We need to finalize the notion of profiles before we can add optional and/or non-portable functionality to the suite. The way I'd like to craft the profile(s) is based on the abstract functionality provided, such as by the default/standard StorageClass(es), rather than by provider-specific functionality/types. For example, "PVCs with shared-read volumes" could be something we add to a conformance profile. It would be helpful for the Storage SIG to draft a proposal for what functionality could be expected to be reasonably portable and widely supported that we could shape into a profile or add to a profile (e.g., a cloud-provider profile). cc @kubernetes/sig-architecture-api-reviews @kubernetes/sig-storage-api-reviews |
Thanks @bgrant0607. @msau42 @pospispa looks like this warrants a more involved discussion and might not be in scope for 1.11 timeframe(Code freeze is 6/5). Correct me if you think otherwise. I will schedule a followup meeting with @msau42 @saad-ali @pospispa @WilliamDenniss to explore profiles in context of Sig Storage. |
@pospispa I am trying to add you to a meeting, but am unable to find your contact in Slack. Please provide me with an email id to add to the sync. |
My understanding of the comment is same. As it requires several prerequisites described in comment IMHO, it's too late for the 1.11 timeframe. @AishSundar my email is |
I'm also not so keen to add a mechanism that's only applicable to storage resources. What mechanism is this intending to use? Finalizers? |
@bgrant0607 the Current @bgrant0607 do you currently need any additional information about the |
@pospispa Prevents how? |
It prevents removal by adding a finalizer to the PV if it is bound to a PVC, and/or to the PVC if it's in use by a Pod |
I'd like to add that there's a K8s server API feature that prevents removal of objects whose list of finalizers is not empty. In case such an object is deleted by a user the object with non-empty finalizers list is not removed but it's deletion timestamp is set. As soon as the object's finalizers list becomes empty the object is removed from the system. |
@pospispa This feature was worked on in the previous milestone, so we'd like to check in and see if there are any plans for this to graduate stages in Kubernetes 1.12. This still has the 1.11 milestone as well so we need to update it accordingly. Can you please update the feature milestone tracking in the original post as well? Please note that the Features Freeze is July 31st, after which any incomplete Feature issues will require an Exception request to be accepted into the milestone.In addition, please be aware of the following relevant deadlines:
Please make sure all PRs for features have relevant release notes included as well. Happy shipping! |
This feature went GA in 1.11. I think this can be closed? |
Good catch, @msau42! |
Update aws_under_the_hood.md to clarify pod vs node instance
Feature Description
1.10skippedThe text was updated successfully, but these errors were encountered: