enhancements icon indicating copy to clipboard operation
enhancements copied to clipboard

KEP-4742: Expose Node Labels via Downward API

Open docandrew opened this issue 1 year ago • 3 comments
trafficstars

  • Adding new KEP 4742: Expose Node Labels via Downward API
  • Issue link: https://github.com/kubernetes/enhancements/issues/4742
  • Other comments: In response to discussion here: https://github.com/kubernetes/kubernetes/issues/40610

docandrew avatar Jul 01 '24 22:07 docandrew

Welcome @docandrew!

It looks like this is your first PR to kubernetes/enhancements 🎉. Please refer to our pull request process documentation to help your PR have a smooth ride to approval.

You will be prompted by a bot to use commands during the review process. Do not be afraid to follow the prompts! It is okay to experiment. Here is the bot commands documentation.

You can also check if kubernetes/enhancements has its own contribution guidelines.

You may want to refer to our testing guide if you run into trouble with your tests not passing.

If you are having difficulty getting your pull request seen, please follow the recommended escalation practices. Also, for tips and tricks in the contribution process you may want to read the Kubernetes contributor cheat sheet. We want to make sure your contribution gets all the attention it needs!

Thank you, and welcome to Kubernetes. :smiley:

k8s-ci-robot avatar Jul 01 '24 22:07 k8s-ci-robot

Hi @docandrew. Thanks for your PR.

I'm waiting for a kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

k8s-ci-robot avatar Jul 01 '24 22:07 k8s-ci-robot

/cc @kerthcet

pacoxu avatar Jul 05 '24 07:07 pacoxu

As discussed at https://github.com/kubernetes/kubernetes/issues/40610 this is open a lot of concerns around security

ArangoGutierrez avatar Jul 08 '24 10:07 ArangoGutierrez

As discussed at kubernetes/kubernetes#40610 this is open a lot of concerns around security

I think we can do this in a safe way. Let me know if the reply makes sense. Happy to work through this and give examples.

cmwylie19 avatar Jul 08 '24 13:07 cmwylie19

As discussed at kubernetes/kubernetes#40610 this is open a lot of concerns around security

I think we can do this in a safe way. Let me know if the reply makes sense. Happy to work through this and give examples.

After reading the entire conversation on the KEP issue and related links, I am ok with this now. As NFD maintainer I am eager to help here, as NFD creates labels for the underlying infra

ArangoGutierrez avatar Jul 09 '24 12:07 ArangoGutierrez

/ok-to-test

SergeyKanzhelev avatar Jul 09 '24 17:07 SergeyKanzhelev

/sig auth

need opinion on security and potential abuse

SergeyKanzhelev avatar Jul 09 '24 17:07 SergeyKanzhelev

some concerns to address: https://github.com/kubernetes/kubernetes/issues/40610#issuecomment-2189848266

SergeyKanzhelev avatar Jul 09 '24 17:07 SergeyKanzhelev

Notes I got from the meeting so they can be fixed and address later when there is time:

  • [ ] Document behavior around restarts as it relates to fileMounts and env (values may change)
  • [ ] Elaborate/Fix use-cases (can't use vpn for example based on fixed values)

updated since we are not considering using kubelet flags

cmwylie19 avatar Jul 09 '24 19:07 cmwylie19

I am -2 on kubelet flags. In most managed providers, those flags are not accessible to users or admins, and differeing opinions between providers will make portability WORSE, not better.

We'd do better to define a small set of extension mechanisms and leave it fixed at that.

thockin avatar Jul 09 '24 20:07 thockin

Just as an after thought https://github.com/kubernetes-sigs/node-feature-discovery/issues/1779

ArangoGutierrez avatar Jul 10 '24 10:07 ArangoGutierrez

I have put together an example implementation (NOT setting via the kubelet however) to gather feedback on approaches here: https://github.com/kubernetes/kubernetes/pull/127092 - hopefully this can help facilitate some discussion!

munnerz avatar Sep 03 '24 13:09 munnerz

/assign @nilekhc

ibihim avatar Sep 09 '24 16:09 ibihim

I think KubeRay would really benefit from this proposal in order to propoagate node topology into the Raylet. Are we planning to push this forward in v1.32?

andrewsykim avatar Sep 29 '24 20:09 andrewsykim

The KEP window is almost done - is this shooting to make 1.32?

thockin avatar Sep 29 '24 22:09 thockin

I'd love that but will likely need some hand-holding to help shepherd this through the process.

docandrew avatar Sep 30 '24 20:09 docandrew

@munnerz has a POC of some parts of this - the question to be answered is what are the tradeoffs we are making between different approaches, and which do you think are "best".

thockin avatar Sep 30 '24 20:09 thockin

I'd love that but will likely need some hand-holding to help shepherd this through the process.

I'd be happy to help - I'll ping you on slack 😊

Edit: or ping me @munnerz as I'm not 100% sure which slack account is yours 👀

munnerz avatar Sep 30 '24 22:09 munnerz

I see some pushes but I don't know if that means "please go read it again" or if it is still in-progress. I will assume the latter (WIP) until I hear otherwise.

thockin avatar Oct 04 '24 22:10 thockin

Not quite ready yet - I think @munnerz was going to add some additional details and hopefully correct me on some things, but getting close!

docandrew avatar Oct 04 '24 23:10 docandrew

Can we prioritize this for v1.33? Seems like all the pieces are there but we just need to make some final changes to the KEP. I'm happy to drive this if there are no owners.

andrewsykim avatar Nov 08 '24 16:11 andrewsykim

cc @pradeep-anyscale The KEP to expose topology information

kevin85421 avatar Jan 10 '25 21:01 kevin85421

Please let me know when this is ready for reading!

thockin avatar Jan 13 '25 23:01 thockin

@munnerz SIG Node is doing planning for 1.33 now. Do you want to continue owning this or pushing this forward?

dchen1107 avatar Jan 15 '25 17:01 dchen1107

@munnerz @docandrew do you have any plans to continue pushing this for v1.33?

andrewsykim avatar Jan 30 '25 01:01 andrewsykim

@andrewsykim I think I addressed most of the concerns in the KEP verbiage itself, which should match the proof-of-concept implementation PR that @munnerz wrote. I'd still like to see it adopted, perhaps in v1.33.

docandrew avatar Jan 31 '25 15:01 docandrew

@docandrew thanks -- in Oct you added this comment:

Not quite ready yet - I think @munnerz was going to add some additional details and hopefully correct me on some things, but getting close!

And I haven't seen any updates since. Can you update the KEP with additional details and let us know when it's ready for review?

andrewsykim avatar Jan 31 '25 16:01 andrewsykim

@docandrew gentle ping on my last comment. Keep in mind production readiness freeze is Feb 6th and KEP freeze is Feb 13th

andrewsykim avatar Feb 03 '25 22:02 andrewsykim

Thank you for following up - from my point of view it's ready for re-review.

docandrew avatar Feb 04 '25 15:02 docandrew