From 671d9f60bcb406c0d023af9821a668a80a875df6 Mon Sep 17 00:00:00 2001 From: Li Zhijian Date: Thu, 21 Jan 2021 14:24:36 +0800 Subject: [PATCH 01/12] copy template Signed-off-by: Li Zhijian --- .../1668-trace-popagating/README.md | 594 ++++++++++++++++++ .../1668-trace-popagating/kep.yaml | 51 ++ 2 files changed, 645 insertions(+) create mode 100644 keps/sig-instrumentation/1668-trace-popagating/README.md create mode 100644 keps/sig-instrumentation/1668-trace-popagating/kep.yaml diff --git a/keps/sig-instrumentation/1668-trace-popagating/README.md b/keps/sig-instrumentation/1668-trace-popagating/README.md new file mode 100644 index 00000000000..c94210c87fb --- /dev/null +++ b/keps/sig-instrumentation/1668-trace-popagating/README.md @@ -0,0 +1,594 @@ + +# KEP-NNNN: Your short, descriptive title + + + + + + +- [Release Signoff Checklist](#release-signoff-checklist) +- [Summary](#summary) +- [Motivation](#motivation) + - [Goals](#goals) + - [Non-Goals](#non-goals) +- [Proposal](#proposal) + - [User Stories (Optional)](#user-stories-optional) + - [Story 1](#story-1) + - [Story 2](#story-2) + - [Notes/Constraints/Caveats (Optional)](#notesconstraintscaveats-optional) + - [Risks and Mitigations](#risks-and-mitigations) +- [Design Details](#design-details) + - [Test Plan](#test-plan) + - [Graduation Criteria](#graduation-criteria) + - [Upgrade / Downgrade Strategy](#upgrade--downgrade-strategy) + - [Version Skew Strategy](#version-skew-strategy) +- [Production Readiness Review Questionnaire](#production-readiness-review-questionnaire) + - [Feature Enablement and Rollback](#feature-enablement-and-rollback) + - [Rollout, Upgrade and Rollback Planning](#rollout-upgrade-and-rollback-planning) + - [Monitoring Requirements](#monitoring-requirements) + - [Dependencies](#dependencies) + - [Scalability](#scalability) + - [Troubleshooting](#troubleshooting) +- [Implementation History](#implementation-history) +- [Drawbacks](#drawbacks) +- [Alternatives](#alternatives) +- [Infrastructure Needed (Optional)](#infrastructure-needed-optional) + + +## Release Signoff Checklist + + + +Items marked with (R) are required *prior to targeting to a milestone / release*. + +- [ ] (R) Enhancement issue in release milestone, which links to KEP dir in [kubernetes/enhancements] (not the initial KEP PR) +- [ ] (R) KEP approvers have approved the KEP status as `implementable` +- [ ] (R) Design details are appropriately documented +- [ ] (R) Test plan is in place, giving consideration to SIG Architecture and SIG Testing input +- [ ] (R) Graduation criteria is in place +- [ ] (R) Production readiness review completed +- [ ] (R) Production readiness review approved +- [ ] "Implementation History" section is up-to-date for milestone +- [ ] User-facing documentation has been created in [kubernetes/website], for publication to [kubernetes.io] +- [ ] Supporting documentation—e.g., additional design documents, links to mailing list discussions/SIG meetings, relevant PRs/issues, release notes + + + +[kubernetes.io]: https://kubernetes.io/ +[kubernetes/enhancements]: https://git.k8s.io/enhancements +[kubernetes/kubernetes]: https://git.k8s.io/kubernetes +[kubernetes/website]: https://git.k8s.io/website + +## Summary + + + +## Motivation + + + +### Goals + + + +### Non-Goals + + + +## Proposal + + + +### User Stories (Optional) + + + +#### Story 1 + +#### Story 2 + +### Notes/Constraints/Caveats (Optional) + + + +### Risks and Mitigations + + + +## Design Details + + + +### Test Plan + + + +### Graduation Criteria + + + +### Upgrade / Downgrade Strategy + + + +### Version Skew Strategy + + + +## Production Readiness Review Questionnaire + + + +### Feature Enablement and Rollback + +_This section must be completed when targeting alpha to a release._ + +* **How can this feature be enabled / disabled in a live cluster?** + - [ ] Feature gate (also fill in values in `kep.yaml`) + - Feature gate name: + - Components depending on the feature gate: + - [ ] Other + - Describe the mechanism: + - Will enabling / disabling the feature require downtime of the control + plane? + - Will enabling / disabling the feature require downtime or reprovisioning + of a node? (Do not assume `Dynamic Kubelet Config` feature is enabled). + +* **Does enabling the feature change any default behavior?** + Any change of default behavior may be surprising to users or break existing + automations, so be extremely careful here. + +* **Can the feature be disabled once it has been enabled (i.e. can we roll back + the enablement)?** + Also set `disable-supported` to `true` or `false` in `kep.yaml`. + Describe the consequences on existing workloads (e.g., if this is a runtime + feature, can it break the existing applications?). + +* **What happens if we reenable the feature if it was previously rolled back?** + +* **Are there any tests for feature enablement/disablement?** + The e2e framework does not currently support enabling or disabling feature + gates. However, unit tests in each component dealing with managing data, created + with and without the feature, are necessary. At the very least, think about + conversion tests if API types are being modified. + +### Rollout, Upgrade and Rollback Planning + +_This section must be completed when targeting beta graduation to a release._ + +* **How can a rollout fail? Can it impact already running workloads?** + Try to be as paranoid as possible - e.g., what if some components will restart + mid-rollout? + +* **What specific metrics should inform a rollback?** + +* **Were upgrade and rollback tested? Was the upgrade->downgrade->upgrade path tested?** + Describe manual testing that was done and the outcomes. + Longer term, we may want to require automated upgrade/rollback tests, but we + are missing a bunch of machinery and tooling and can't do that now. + +* **Is the rollout accompanied by any deprecations and/or removals of features, APIs, +fields of API types, flags, etc.?** + Even if applying deprecation policies, they may still surprise some users. + +### Monitoring Requirements + +_This section must be completed when targeting beta graduation to a release._ + +* **How can an operator determine if the feature is in use by workloads?** + Ideally, this should be a metric. Operations against the Kubernetes API (e.g., + checking if there are objects with field X set) may be a last resort. Avoid + logs or events for this purpose. + +* **What are the SLIs (Service Level Indicators) an operator can use to determine +the health of the service?** + - [ ] Metrics + - Metric name: + - [Optional] Aggregation method: + - Components exposing the metric: + - [ ] Other (treat as last resort) + - Details: + +* **What are the reasonable SLOs (Service Level Objectives) for the above SLIs?** + At a high level, this usually will be in the form of "high percentile of SLI + per day <= X". It's impossible to provide comprehensive guidance, but at the very + high level (needs more precise definitions) those may be things like: + - per-day percentage of API calls finishing with 5XX errors <= 1% + - 99% percentile over day of absolute value from (job creation time minus expected + job creation time) for cron job <= 10% + - 99,9% of /health requests per day finish with 200 code + +* **Are there any missing metrics that would be useful to have to improve observability +of this feature?** + Describe the metrics themselves and the reasons why they weren't added (e.g., cost, + implementation difficulties, etc.). + +### Dependencies + +_This section must be completed when targeting beta graduation to a release._ + +* **Does this feature depend on any specific services running in the cluster?** + Think about both cluster-level services (e.g. metrics-server) as well + as node-level agents (e.g. specific version of CRI). Focus on external or + optional services that are needed. For example, if this feature depends on + a cloud provider API, or upon an external software-defined storage or network + control plane. + + For each of these, fill in the following—thinking about running existing user workloads + and creating new ones, as well as about cluster-level services (e.g. DNS): + - [Dependency name] + - Usage description: + - Impact of its outage on the feature: + - Impact of its degraded performance or high-error rates on the feature: + + +### Scalability + +_For alpha, this section is encouraged: reviewers should consider these questions +and attempt to answer them._ + +_For beta, this section is required: reviewers must answer these questions._ + +_For GA, this section is required: approvers should be able to confirm the +previous answers based on experience in the field._ + +* **Will enabling / using this feature result in any new API calls?** + Describe them, providing: + - API call type (e.g. PATCH pods) + - estimated throughput + - originating component(s) (e.g. Kubelet, Feature-X-controller) + focusing mostly on: + - components listing and/or watching resources they didn't before + - API calls that may be triggered by changes of some Kubernetes resources + (e.g. update of object X triggers new updates of object Y) + - periodic API calls to reconcile state (e.g. periodic fetching state, + heartbeats, leader election, etc.) + +* **Will enabling / using this feature result in introducing new API types?** + Describe them, providing: + - API type + - Supported number of objects per cluster + - Supported number of objects per namespace (for namespace-scoped objects) + +* **Will enabling / using this feature result in any new calls to the cloud +provider?** + +* **Will enabling / using this feature result in increasing size or count of +the existing API objects?** + Describe them, providing: + - API type(s): + - Estimated increase in size: (e.g., new annotation of size 32B) + - Estimated amount of new objects: (e.g., new Object X for every existing Pod) + +* **Will enabling / using this feature result in increasing time taken by any +operations covered by [existing SLIs/SLOs]?** + Think about adding additional work or introducing new steps in between + (e.g. need to do X to start a container), etc. Please describe the details. + +* **Will enabling / using this feature result in non-negligible increase of +resource usage (CPU, RAM, disk, IO, ...) in any components?** + Things to keep in mind include: additional in-memory state, additional + non-trivial computations, excessive access to disks (including increased log + volume), significant amount of data sent and/or received over network, etc. + This through this both in small and large cases, again with respect to the + [supported limits]. + +### Troubleshooting + +The Troubleshooting section currently serves the `Playbook` role. We may consider +splitting it into a dedicated `Playbook` document (potentially with some monitoring +details). For now, we leave it here. + +_This section must be completed when targeting beta graduation to a release._ + +* **How does this feature react if the API server and/or etcd is unavailable?** + +* **What are other known failure modes?** + For each of them, fill in the following information by copying the below template: + - [Failure mode brief description] + - Detection: How can it be detected via metrics? Stated another way: + how can an operator troubleshoot without logging into a master or worker node? + - Mitigations: What can be done to stop the bleeding, especially for already + running user workloads? + - Diagnostics: What are the useful log messages and their required logging + levels that could help debug the issue? + Not required until feature graduated to beta. + - Testing: Are there any tests for failure mode? If not, describe why. + +* **What steps should be taken if SLOs are not being met to determine the problem?** + +[supported limits]: https://git.k8s.io/community//sig-scalability/configs-and-limits/thresholds.md +[existing SLIs/SLOs]: https://git.k8s.io/community/sig-scalability/slos/slos.md#kubernetes-slisslos + +## Implementation History + + + +## Drawbacks + + + +## Alternatives + + + +## Infrastructure Needed (Optional) + + diff --git a/keps/sig-instrumentation/1668-trace-popagating/kep.yaml b/keps/sig-instrumentation/1668-trace-popagating/kep.yaml new file mode 100644 index 00000000000..81b23e5d84f --- /dev/null +++ b/keps/sig-instrumentation/1668-trace-popagating/kep.yaml @@ -0,0 +1,51 @@ +title: KEP Template +kep-number: NNNN +authors: + - "@jane.doe" +owning-sig: sig-xyz +participating-sigs: + - sig-aaa + - sig-bbb +status: provisional|implementable|implemented|deferred|rejected|withdrawn|replaced +creation-date: yyyy-mm-dd +reviewers: + - TBD + - "@alice.doe" +approvers: + - TBD + - "@oscar.doe" +prr-approvers: + - TBD + - "@bob.doe" +see-also: + - "/keps/sig-aaa/1234-we-heard-you-like-keps" + - "/keps/sig-bbb/2345-everyone-gets-a-kep" +replaces: + - "/keps/sig-ccc/3456-replaced-kep" + +# The target maturity stage in the current dev cycle for this KEP. +stage: alpha|beta|stable + +# The most recent milestone for which work toward delivery of this KEP has been +# done. This can be the current (upcoming) milestone, if it is being actively +# worked on. +latest-milestone: "v1.19" + +# The milestone at which this feature was, or is targeted to be, at each stage. +milestone: + alpha: "v1.19" + beta: "v1.20" + stable: "v1.22" + +# The following PRR answers are required at alpha release +# List the feature gate name and the components for which it must be enabled +feature-gates: + - name: MyFeature + components: + - kube-apiserver + - kube-controller-manager +disable-supported: true + +# The following PRR answers are required at beta release +metrics: + - my_feature_metric From 076f6773fb8c2380625e162a93e364fb82923a25 Mon Sep 17 00:00:00 2001 From: Li Zhijian Date: Thu, 21 Jan 2021 14:34:59 +0800 Subject: [PATCH 02/12] Draft a new KEP trace-popagating Signed-off-by: Li Zhijian --- .../1668-trace-popagating/README.md | 348 +++++++----------- .../1668-trace-popagating/kep.yaml | 48 ++- 2 files changed, 158 insertions(+), 238 deletions(-) diff --git a/keps/sig-instrumentation/1668-trace-popagating/README.md b/keps/sig-instrumentation/1668-trace-popagating/README.md index c94210c87fb..de30e285801 100644 --- a/keps/sig-instrumentation/1668-trace-popagating/README.md +++ b/keps/sig-instrumentation/1668-trace-popagating/README.md @@ -1,96 +1,31 @@ - -# KEP-NNNN: Your short, descriptive title - - - - +# KEP-1668: Trace information popagation - [Release Signoff Checklist](#release-signoff-checklist) - [Summary](#summary) - [Motivation](#motivation) + - [Definitions](#definitions) - [Goals](#goals) - [Non-Goals](#non-goals) - [Proposal](#proposal) - - [User Stories (Optional)](#user-stories-optional) - - [Story 1](#story-1) - - [Story 2](#story-2) - - [Notes/Constraints/Caveats (Optional)](#notesconstraintscaveats-optional) + - [Architecture](#architecture) + - [Trace context propagation](#trace-context-propagation) + - [Mutating admission webhook](#mutating-admission-webhook) - [Risks and Mitigations](#risks-and-mitigations) - [Design Details](#design-details) + - [In-tree changes](#in-tree-changes) + - [Trace Utility Package](#trace-utility-package) + - [Add Go context to parameter list](#add-go-context-to-parameter-list) + - [Out-of-tree changes](#out-of-tree-changes) + - [Mutating webhook](#mutating-webhook) + - [Behaviors with and without Mutating webhook](#behaviors-with-and-without-mutating-webhook) + - [with Mutating webhook](#with-mutating-webhook) + - [without Mutating webhook](#without-mutating-webhook) - [Test Plan](#test-plan) - [Graduation Criteria](#graduation-criteria) + - [Alpha](#alpha) + - [Beta](#beta) + - [GA](#ga) - [Upgrade / Downgrade Strategy](#upgrade--downgrade-strategy) - [Version Skew Strategy](#version-skew-strategy) - [Production Readiness Review Questionnaire](#production-readiness-review-questionnaire) @@ -146,82 +81,47 @@ Items marked with (R) are required *prior to targeting to a milestone / release* ## Summary - +This KEP proposes to propagate trace context across components and across a series of related objects originating from an user request. It lays the foundation for enhancing relevant but scattered logs with the trace information as common identifiers. ## Motivation - +### Definitions + +**Span**: The smallest unit of a trace. It has a start and end time, and is attached to a single trace. + +**Trace**: A collection of Spans which represents a single process. + +**Trace Context**: A reference to a Trace that is designed to be propagated across component boundaries. Sometimes referred to as the "Span Context". It is can be thought of as a pointer to a parent span that child spans can be attached to. ### Goals - +- Trace context received by the API Server as part of [API Server Tracing](https://github.com/kubernetes/enhancements/issues/647) can be propagated to kubernetes components +- A set of objects with relationship(OwnerRef/Non-ownerRef) can be linked by this trace information ### Non-Goals - +- Generate new trace context(Span) +- Replace/change existing logging, metrics, or the events API +- Add additional telemetry to any components which is already done by [API Server Tracing](https://github.com/kubernetes/enhancements/issues/647). +- Run any additional OpenTelemetry components (such as the OpenTelemetry collector, which the [API Server Tracing](https://github.com/kubernetes/enhancements/issues/647) KEP uses) ## Proposal - +### Architecture -### User Stories (Optional) +### Trace context propagation - +To link work done across components as belonging to the same action(user request), we must pass trace context across process boundaries. In traditional distributed systems, this context can be passed down through RPC metadata or HTTP headers. Kubernetes, however, due to its watch-based nature, requires us to attach trace context directly to the target object. -#### Story 1 +In this proposal, we choose to propagate this trace context as object annotations called `trace.kubernetes.io/context` -#### Story 2 +### Mutating admission webhook -### Notes/Constraints/Caveats (Optional) +For trace context to be correlated as part of the same action, we must extract the trace context from the incomming request and embed it in target objects. To accomplish this, we have introduced an [out-of-tree mutating admission webhook](https://github.com/Hellcatlk/mutating-trace-admission-controller/tree/trace-ot). - +The proposed in-tree changes will utilize the span context annotation injected into objects with this webhook. ### Risks and Mitigations @@ -239,89 +139,113 @@ Consider including folks who also work outside the SIG or subproject. ## Design Details - +### In-tree changes -### Test Plan +#### Trace Utility Package - +| APIs | file name | +| ----------------------------- | ------------------------------------------------------------ | +| createPods() | pkg/controller/controller_utils.go | +| CreatePodsWithControllerRef() | pkg/controller/controller_utils.go
pkg/controller/replication/conversion.go
pkg/controller/daemon/daemon_controller.go
pkg/controller/replication/conversion.go | -### Graduation Criteria - +- Controller start uses otel to start a new Span +- Controller uses otel to propagate `span context` to the other end(APIServer) +- APIServer uses otel to start related Span, which connected to the `span context` from the incoming request +- APIServer uses otel to propagate `span context` to the other end +- ~~Webhook persists `span context` to object~~ + +In short, the webhook decides whether to add `span context` to the object. + +### Test Plan + +All added code will be covered by unit tests. + +### Graduation Criteria + +#### Alpha + +- Feature covers 3 important workload objects: Deployment, Statefulset, Daemonset +- Related unit tests described in this KEP are completed + +#### Beta + +- Feature covers other objects which not limited to ownerRef relationship +- All necessary tests are completed + +#### GA + +- Feedback about this feature is collected and addressed +- Enabled in Beta for at least two releases without complaints ### Upgrade / Downgrade Strategy @@ -382,9 +306,9 @@ you need any help or guidance. _This section must be completed when targeting alpha to a release._ * **How can this feature be enabled / disabled in a live cluster?** - - [ ] Feature gate (also fill in values in `kep.yaml`) - - Feature gate name: - - Components depending on the feature gate: + - [x] Feature gate (also fill in values in `kep.yaml`) + - Feature gate name: TracePopagating + - Components depending on the feature gate: kube-controller-manager - [ ] Other - Describe the mechanism: - Will enabling / disabling the feature require downtime of the control @@ -393,30 +317,32 @@ _This section must be completed when targeting alpha to a release._ of a node? (Do not assume `Dynamic Kubelet Config` feature is enabled). * **Does enabling the feature change any default behavior?** - Any change of default behavior may be surprising to users or break existing - automations, so be extremely careful here. + + In apiserver, new request handlers added by this feature will generate + or update the trace context , then the trace context will be added to the + object's annotation by the webhook provided by this feature. + + In controller-manager, when sending request to apiserver, it will get the + trace context from the referenced object's annotation and inject the trace context into the + outgoing request header with the W3C format. * **Can the feature be disabled once it has been enabled (i.e. can we roll back the enablement)?** - Also set `disable-supported` to `true` or `false` in `kep.yaml`. - Describe the consequences on existing workloads (e.g., if this is a runtime - feature, can it break the existing applications?). +Yes * **What happens if we reenable the feature if it was previously rolled back?** + Objects created during the rollback will have no trace context until they + are recreated. * **Are there any tests for feature enablement/disablement?** - The e2e framework does not currently support enabling or disabling feature - gates. However, unit tests in each component dealing with managing data, created - with and without the feature, are necessary. At the very least, think about - conversion tests if API types are being modified. + Unit test can ensure that the feature enablement/disablement is valid ### Rollout, Upgrade and Rollback Planning _This section must be completed when targeting beta graduation to a release._ * **How can a rollout fail? Can it impact already running workloads?** - Try to be as paranoid as possible - e.g., what if some components will restart - mid-rollout? + It will not have impact on running workloads. * **What specific metrics should inform a rollback?** diff --git a/keps/sig-instrumentation/1668-trace-popagating/kep.yaml b/keps/sig-instrumentation/1668-trace-popagating/kep.yaml index 81b23e5d84f..75b9495c211 100644 --- a/keps/sig-instrumentation/1668-trace-popagating/kep.yaml +++ b/keps/sig-instrumentation/1668-trace-popagating/kep.yaml @@ -1,51 +1,45 @@ -title: KEP Template -kep-number: NNNN +title: trace information popagation +kep-number: 1668 authors: - - "@jane.doe" -owning-sig: sig-xyz + - "@hase1128" + - "@KobayashiD27" + - "@fenggw-fnst" + - "@zhijianli88" + - "@Hellcatlk" +owning-sig: sig-instrumentation participating-sigs: - - sig-aaa - - sig-bbb -status: provisional|implementable|implemented|deferred|rejected|withdrawn|replaced -creation-date: yyyy-mm-dd +status: provisional +creation-date: 2020-09-01 reviewers: - - TBD - - "@alice.doe" + - "@dashpole" + - "@serathius" approvers: - - TBD - - "@oscar.doe" + - "@dashpole" prr-approvers: - - TBD - - "@bob.doe" see-also: - - "/keps/sig-aaa/1234-we-heard-you-like-keps" - - "/keps/sig-bbb/2345-everyone-gets-a-kep" replaces: - - "/keps/sig-ccc/3456-replaced-kep" # The target maturity stage in the current dev cycle for this KEP. -stage: alpha|beta|stable +stage: alpha # The most recent milestone for which work toward delivery of this KEP has been # done. This can be the current (upcoming) milestone, if it is being actively # worked on. -latest-milestone: "v1.19" +latest-milestone: "v1.21" # The milestone at which this feature was, or is targeted to be, at each stage. milestone: - alpha: "v1.19" - beta: "v1.20" - stable: "v1.22" + alpha: "v1.21" + beta: "v1.22" + stable: "v1.25" # The following PRR answers are required at alpha release # List the feature gate name and the components for which it must be enabled feature-gates: - - name: MyFeature - components: - - kube-apiserver - - kube-controller-manager + - name: TracePopagating + components: + - kube-controller-manager disable-supported: true # The following PRR answers are required at beta release metrics: - - my_feature_metric From 2e7e52ac5fb2e87fec995e8454f11d17d285e0c3 Mon Sep 17 00:00:00 2001 From: Li Zhijian Date: Thu, 21 Jan 2021 14:52:42 +0800 Subject: [PATCH 03/12] complete KEP for alpha Signed-off-by: Li Zhijian --- .../1668-trace-popagating/README.md | 53 ++++++------------- .../1668-trace-popagating/kep.yaml | 1 + 2 files changed, 17 insertions(+), 37 deletions(-) diff --git a/keps/sig-instrumentation/1668-trace-popagating/README.md b/keps/sig-instrumentation/1668-trace-popagating/README.md index de30e285801..f96b76d0039 100644 --- a/keps/sig-instrumentation/1668-trace-popagating/README.md +++ b/keps/sig-instrumentation/1668-trace-popagating/README.md @@ -1,4 +1,4 @@ -# KEP-1668: Trace information popagation +# KEP-1668: Trace popagating - [Release Signoff Checklist](#release-signoff-checklist) @@ -417,45 +417,26 @@ _For GA, this section is required: approvers should be able to confirm the previous answers based on experience in the field._ * **Will enabling / using this feature result in any new API calls?** - Describe them, providing: - - API call type (e.g. PATCH pods) - - estimated throughput - - originating component(s) (e.g. Kubelet, Feature-X-controller) - focusing mostly on: - - components listing and/or watching resources they didn't before - - API calls that may be triggered by changes of some Kubernetes resources - (e.g. update of object X triggers new updates of object Y) - - periodic API calls to reconcile state (e.g. periodic fetching state, - heartbeats, leader election, etc.) + N/A * **Will enabling / using this feature result in introducing new API types?** - Describe them, providing: - - API type - - Supported number of objects per cluster - - Supported number of objects per namespace (for namespace-scoped objects) + N/A * **Will enabling / using this feature result in any new calls to the cloud provider?** + N/A * **Will enabling / using this feature result in increasing size or count of the existing API objects?** - Describe them, providing: - - API type(s): - - Estimated increase in size: (e.g., new annotation of size 32B) - - Estimated amount of new objects: (e.g., new Object X for every existing Pod) + N/A * **Will enabling / using this feature result in increasing time taken by any operations covered by [existing SLIs/SLOs]?** - Think about adding additional work or introducing new steps in between - (e.g. need to do X to start a container), etc. Please describe the details. + N/A * **Will enabling / using this feature result in non-negligible increase of resource usage (CPU, RAM, disk, IO, ...) in any components?** - Things to keep in mind include: additional in-memory state, additional - non-trivial computations, excessive access to disks (including increased log - volume), significant amount of data sent and/or received over network, etc. - This through this both in small and large cases, again with respect to the - [supported limits]. + TBD ### Troubleshooting @@ -466,26 +447,24 @@ details). For now, we leave it here. _This section must be completed when targeting beta graduation to a release._ * **How does this feature react if the API server and/or etcd is unavailable?** + The feature will be unavailable. * **What are other known failure modes?** - For each of them, fill in the following information by copying the below template: - - [Failure mode brief description] - - Detection: How can it be detected via metrics? Stated another way: - how can an operator troubleshoot without logging into a master or worker node? - - Mitigations: What can be done to stop the bleeding, especially for already - running user workloads? - - Diagnostics: What are the useful log messages and their required logging - levels that could help debug the issue? - Not required until feature graduated to beta. - - Testing: Are there any tests for failure mode? If not, describe why. + TBD * **What steps should be taken if SLOs are not being met to determine the problem?** + N/A [supported limits]: https://git.k8s.io/community//sig-scalability/configs-and-limits/thresholds.md [existing SLIs/SLOs]: https://git.k8s.io/community/sig-scalability/slos/slos.md#kubernetes-slisslos ## Implementation History - +* 2020-09-01: KEP proposed +* 2020-09-28: PRR questionnaire updated +* [Mutating admission webhook which injects trace context for demo](https://github.com/Hellcatlk/mutating-trace-admission-controller/tree/trace-ot) +* [Instrumentation of Kubernetes components for demo](https://github.com/Hellcatlk/kubernetes/pull/1) +* [Instrumentation of Kubernetes components for demo based on KEP647](https://github.com/Hellcatlk/kubernetes/pull/3) +* refactor [Log tracking](https://github.com/kubernetes/enhancements/pull/1961) KEP to Trace popagating - [Release Signoff Checklist](#release-signoff-checklist) @@ -309,7 +309,7 @@ _This section must be completed when targeting alpha to a release._ * **How can this feature be enabled / disabled in a live cluster?** - [x] Feature gate (also fill in values in `kep.yaml`) - - Feature gate name: TracePopagating + - Feature gate name: PropagateContextTrace - Components depending on the feature gate: kube-controller-manager - [ ] Other - Describe the mechanism: @@ -466,7 +466,7 @@ _This section must be completed when targeting beta graduation to a release._ * [Mutating admission webhook which injects trace context for demo](https://github.com/Hellcatlk/mutating-trace-admission-controller/tree/trace-ot) * [Instrumentation of Kubernetes components for demo](https://github.com/Hellcatlk/kubernetes/pull/1) * [Instrumentation of Kubernetes components for demo based on KEP647](https://github.com/Hellcatlk/kubernetes/pull/3) -* refactor [Log tracking](https://github.com/kubernetes/enhancements/pull/1961) KEP to Trace popagating +* refactor [Log tracking](https://github.com/kubernetes/enhancements/pull/1961) KEP to Trace Context Propagation