enhancements
enhancements copied to clipboard
Forensic Container Checkpointing
Enhancement Description
- One-line enhancement description (can be used as a release note): Forensic Container Checkpointing
- Kubernetes Enhancement Proposal: https://github.com/kubernetes/enhancements/tree/master/keps/sig-node/2008-forensic-container-checkpointing
- Discussion Link:
- SIG Node weekly meeting: https://docs.google.com/document/d/1Ne57gvidMEWXR70OxxnRkYquAoMpt56o75oZtg-OeBg/edit
- SIG Node planning doc for v1.23: https://docs.google.com/document/d/1U10J0WwgWXkdYrqWGGvO8iH2HKeerQAlygnqgDgWv4E/edit
- Primary contact (assignee): @adrianreber
- Responsible SIGs: Sig Node
- Enhancement target (which target equals to which milestone): No target so far
- Alpha release target (x.y): 1.25
- Beta release target (x.y): 1.30
- Stable release target (x.y): 1.32
- Documentation
- https://kubernetes.io/docs/reference/node/kubelet-checkpoint-api/
- https://kubernetes.io/blog/2022/12/05/forensic-container-checkpointing-alpha/
- https://kubernetes.io/blog/2023/03/10/forensic-container-analysis/
- [x] Alpha (1.25)
- [x] KEP (
k/enhancements) update PR(s):- [x] https://github.com/kubernetes/enhancements/pull/1990
- [x] https://github.com/kubernetes/enhancements/pull/3264
- [x] https://github.com/kubernetes/enhancements/pull/3406
- [x] Code (
k/k) update PR(s):- [x] https://github.com/kubernetes/kubernetes/pull/104907
- [x] https://github.com/kubernetes/kubernetes/pull/115155
- [x] Docs (
k/website) update(s):- [x] https://github.com/kubernetes/website/pull/34940
- [x] https://github.com/kubernetes/website/pull/37412
- [x] https://github.com/kubernetes/website/pull/39759
- [x] https://github.com/kubernetes/website/pull/39842
- [x] KEP (
- [ ] Beta (1.30)
- [x] KEP (
k/enhancements) update PR(s):- [x] https://github.com/kubernetes/enhancements/pull/4288
- [x] Code (
k/k) update PR(s):- [x] https://github.com/kubernetes/kubernetes/pull/123215
- [ ] Docs (
k/website) update(s):
- [x] KEP (
- [ ] https://github.com/kubernetes/enhancements/pull/4305
- [ ] https://github.com/kubernetes/kubernetes/pull/120898
- Abandoned PR: https://github.com/kubernetes/kubernetes/pull/115888
/sig node
Discussion Link: N/A (or... at multiple conferences during the last years when presenting CRIU and container migration, there was always the question when will we see container migration in Kubernetes)
Responsible SIGs: maybe node
We recommend actively socializing your KEP with the appropriate sig to gain visibility, consensus and also for scheduling. Also as you are not sure of what SIG will sponsor this, reaching out to the SIGs to get clarity on that will be helpful to move your KEP forward.
Hi @adrianreber
Any updates on whether this will be included in 1.20?
Enhancements Freeze is October 6th and by that time we require:
The KEP must be merged in an implementable state The KEP must have test plans The KEP must have graduation criteria The KEP must have an issue in the milestone
Best, Kirsten
Hello @kikisdeliveryservice
Any updates on whether this will be included in 1.20?
Sorry, but how would I decide this? There has not been a lot of feedback on the corresponding KEP which makes it really difficult for me to answer that question. On the other hand, maybe the missing feedback is a good sign that it will take some more time. So probably this will not be included in 1.20.
Normally the sig would give a clear signal that it would be included. That would be by : reviewing the KEP, agreeing to the milestone proposals in the KEP etc.. I'd encourage you to keep in touch with them and start the 1.21 conversation early if this does not end up getting reviewed/merged properly by October 6th.
Best, Kirsten
@kikisdeliveryservice Thanks for the guidance. Will do.
Issues go stale after 90d of inactivity.
Mark the issue as fresh with /remove-lifecycle stale.
Stale issues rot after an additional 30d of inactivity and eventually close.
If this issue is safe to close now please do so with /close.
Send feedback to sig-testing, kubernetes/test-infra and/or fejta. /lifecycle stale
Stale issues rot after 30d of inactivity.
Mark the issue as fresh with /remove-lifecycle rotten.
Rotten issues close after an additional 30d of inactivity.
If this issue is safe to close now please do so with /close.
Send feedback to sig-testing, kubernetes/test-infra and/or fejta. /lifecycle rotten
Rotten issues close after 30d of inactivity.
Reopen the issue with /reopen.
Mark the issue as fresh with /remove-lifecycle rotten.
Send feedback to sig-contributor-experience at kubernetes/community. /close
@fejta-bot: Closing this issue.
In response to this:
Rotten issues close after 30d of inactivity. Reopen the issue with
/reopen. Mark the issue as fresh with/remove-lifecycle rotten.Send feedback to sig-contributor-experience at kubernetes/community. /close
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.
/reopen /remove-lifecycle rotten
@adrianreber: Reopened this issue.
In response to this:
/reopen /remove-lifecycle rotten
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.
Issues go stale after 90d of inactivity.
Mark the issue as fresh with /remove-lifecycle stale.
Stale issues rot after an additional 30d of inactivity and eventually close.
If this issue is safe to close now please do so with /close.
Send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale
/remove-lifecycle stale
Still working on it.
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs.
This bot triages issues and PRs according to the following rules:
- After 90d of inactivity,
lifecycle/staleis applied - After 30d of inactivity since
lifecycle/stalewas applied,lifecycle/rottenis applied - After 30d of inactivity since
lifecycle/rottenwas applied, the issue is closed
You can:
- Mark this issue or PR as fresh with
/remove-lifecycle stale - Mark this issue or PR as rotten with
/lifecycle rotten - Close this issue or PR with
/close - Offer to help out with Issue Triage
Please send feedback to sig-contributor-experience at kubernetes/community.
/lifecycle stale
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs.
This bot triages issues and PRs according to the following rules:
- After 90d of inactivity,
lifecycle/staleis applied - After 30d of inactivity since
lifecycle/stalewas applied,lifecycle/rottenis applied - After 30d of inactivity since
lifecycle/rottenwas applied, the issue is closed
You can:
- Mark this issue or PR as fresh with
/remove-lifecycle rotten - Close this issue or PR with
/close - Offer to help out with Issue Triage
Please send feedback to sig-contributor-experience at kubernetes/community.
/lifecycle rotten
/remove-lifecycle rotten
/remove-lifecycle stale
Hello @adrianreber 👋, 1.24 Enhancements team here.
Just checking in as we approach enhancements freeze on 18:00pm PT on Thursday Feb 3rd, 2022. This enhancement is targeting for stage alpha for 1.24, is this correct?
Here’s where this enhancement currently stands:
- [x] Updated KEP file using the latest template has been merged into the k/enhancements repo.
- [x] KEP status is marked as
implementablefor this release - [x] KEP has a test plan section filled out.
- [x] KEP has up to date graduation criteria.
- [x] KEP has a production readiness review that has been completed and merged into k/enhancements.
Looks like for this one, we would just need to update the following:
- update the open KEP PR https://github.com/kubernetes/enhancements/pull/1990
- to add a Production readiness review (PRR) approval for stage
alpha - update the
kep.yamlfile in the open PR to add a statusimplementable
- to add a Production readiness review (PRR) approval for stage
At the moment, the status of this enhancement is track as at risk. Please keep the issue description up-to-date with appropriate stages. Thank you!
@Priyankasaggu11929 Thanks for the KEP feedback. I tried to update the KEP to address the open issues you listed.
@adrianreber, thanks so much for the quickly updates the PR. 🚀
With #1990 merged, I've updated this enhancement to tracked for the 1.24 cycle. All set for enhancements freeze. Thanks!
Hi @adrianreber :wave: 1.24 Docs lead here.
This enhancement is marked as Needs Docs for the 1.24 release.
Please follow the steps detailed in the documentation to open a PR against the dev-1.24 branch in the k/website repo. This PR can be just a placeholder at this time and must be created before Thursday, March 31st, 2022 @ 18:00 PDT.
Also, if needed take a look at Documenting for a release to familiarize yourself with the docs requirement for the release.
Thanks!
@nate-double-u documentation PR available at https://github.com/kubernetes/website/pull/31753
Hi @adrianreber :wave: 1.24 Release Comms team here.
We have an opt-in process for the feature blog delivery. If you would like to publish a feature blog for this issue in this cycle, then please opt in on this tracking sheet.
The deadline for submissions and the feature blog freeze is scheduled for 01:00 UTC Wednesday 23rd March 2022 / 18:00 PDT Tuesday 22nd March 2022. Other important dates for delivery and review are listed here: https://github.com/kubernetes/sig-release/tree/master/releases/release-1.24#timeline.
For reference, here is the blog for 1.23.
Please feel free to reach out any time to me or on the #release-comms channel with questions or comments.
Thanks!
Hi @adrianreber
I'm checking in as we approach 1.24 code freeze at 01:00 UTC Wednesday 30th March 2022.
Please ensure the following items are completed:
- All PRs to the Kubernetes repo that are related to your enhancement are linked in the above issue description (for tracking purposes).
- All PRs are fully merged by the code freeze deadline.
For this KEP, it looks like just k/k#104907 needs to be merged. Are there any other PRs that you think we should be tracking that would be subject to the 1.24 code freeze?
Let me know if you have any questions.
@rhockenbury There are no other PRs that need to be tracked.
Friendly reminder to try to merge k/k#104907 before code freeze at 01:00 UTC Wednesday 30th March 2022.
KEP update PR for 1.25 https://github.com/kubernetes/enhancements/pull/3264
Hello @adrianreber👋, 1.25 Enhancements team here.
Just checking in as we approach enhancements freeze on 18:00 PST on Thursday June 16, 2022.
For note, This enhancement is targeting for stage alpha for 1.25 (correct me, if otherwise)
Here's where this enhancement currently stands:
- [ ] KEP file using the latest template has been merged into the k/enhancements repo.
- [x] KEP status is marked as
implementable - [ ] KEP has a updated detailed test plan section filled out
- [x] KEP has up to date graduation criteria
- [x] KEP has a production readiness review that has been completed and merged into k/enhancements.
Looks like for this one, we would just need to update the following:
- Update the test plan section in the KEP README.md file to include new additions in the latest template
For note, the status of this enhancement is marked as at risk. Please keep the issue description up-to-date with appropriate stages as well. Thank you!