-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add a KEP for artifact management. #721
Conversation
ss to a | ||
project staging area relevant to their particular artifacts (either storage buck | ||
et or image | ||
registry). Each project is free to manage their assets in the staging area however they feel |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
have we given any thought to excessive resource usage? If all projects have no limits here it seems like the resource usage could get pretty spectacular.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Storage is really, really cheap. I don't think this will be an issue. (though general cost management for k8s-infra is definitely being worked on, so we can detect and manage it if it occurs)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Fair, I was thinking moreso of bandwidth though (?)
FWIW I really appreciate this and am not trying to throw up any hurdles here, this has been an extremely common ask and will be really nice to have. :-)
title: Kubernetes Community Artifact Serving | ||
authors: | ||
- "@brendandburns" | ||
owning-sig: sig-contributor-experience |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is this the right SIG? if so we should CC them
I might suggest release as a possible better fit (or maybe testing)?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I don't really care.
The right fit is actually the k8s-infra working group.
That working group is under the auspices of 4 different SIGs. I don't care which one we choose (and honestly I think this really just shows that this field doesn't fit all KEPs)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
contrib-ex or cluster-lifecycle, IMO
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
ok, I'm sticking w/ contrib-ex unless there are violent objections.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This document describes how official artifacts (Container Images, Binaries) for the Kubernetes
project are managed and distributed.
This really should be owned by sig-release.
/hold |
@calebamiles What is the right process? The template still talks about |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for converting to KEP. I know the image promoted has a KEP but that is focused on GCR for now.
Is this a good place to accumulate the details of the mirroring / distribution / verification design? How about details of global redirector design and availability and monitoring and alerting?
There are tons of details that need to be debated and written down.
title: Kubernetes Community Artifact Serving | ||
authors: | ||
- "@brendandburns" | ||
owning-sig: sig-contributor-experience |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
contrib-ex or cluster-lifecycle, IMO
Comments addressed, still looking for feedback from @calebamiles about what I should do wrt NEXT_KEP_NUMBER. |
@thockin wrt to the additional details, I'd prefer a commit and iterate approach (as suggested in the KEP template) rather than try to get it all correct here, I think we're going to be learning as we go anyway. |
@dims, thanks for the lgtm. Do you know the right process for the NEXT_KEP_NUMBER stuff? That seems like the last blocker.... |
not an approver or reviewer.
@brendandburns -- I would argue that this isn't bikeshedding, or maybe "bikeshedding for cause". k8s-infra is a Working Group, which composed of:
By SC definition, it is meant to be a short-lived effort. I think given the SIGs that are involved in the effort, SIG Release and the Release Engineering subproject is the most appropriate place. There is also a KEP being discussed for building Kubernetes artifacts (#707) and it would be nice if these two were close together. |
As the question of ownership is between SIG ContribEx and SIG Release, I'm also adding the respective Chairs/TLs: ContribEx: Release (+1 from me): |
This seems like it should be owned by SIG Release. If it's owned by contribex - who will maintain and be in the owners files? Assuming dims, justinsb, and brendandburns? I will circulate this on our mailing list. |
title: Kubernetes Community Artifact Serving | ||
authors: | ||
- "@brendandburns" | ||
owning-sig: sig-contributor-experience |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
strong disagree that contribex should own this, IMO this is sig-release, under their release-engineering subproject
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I would be more comfortable with the merge and iterate approach if we got this right
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
+1 @spiffxp
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
+100. I think that comment was also made in previous versions too.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
+1 about sig-release.
cc @cblecker
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yeah, this shouldn't be contribex. +1 to sig-release
I'm fine with sig-release. @thockin any concerns? I think that the k8s-infra working group isn't really a traditional working group. (I actually think it's more like a committee than a working group) it's never going to disband imho, since we're always going to need people to be on-call for the infrastructure that we deploy. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
FWIW other foundations hire full-time staff to manage their infra, and imo CNCF should do the same. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm okay with merge and iterate, provided the owning sig is changed
title: Kubernetes Community Artifact Serving | ||
authors: | ||
- "@brendandburns" | ||
owning-sig: sig-contributor-experience |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yeah, this shouldn't be contribex. +1 to sig-release
I think this looks great and is in keeping with what we discussed / agreed in the meetings. I'm now all enthusiastic to implement |
Closing this in favor of #791, which updates the owning SIG to SIG Release. /close |
@justaugustus: Closed this PR. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Please re-open, I don't think the process of hijacking into a new PR is a good idea. Especially since you could have just added a Github suggestion to do the edit. |
/open |
The code suggestion was dismissed, but we've got it sorted now |
@justaugustus: Failed to re-open PR: state cannot be changed. The master branch was force-pushed or recreated. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
@justinsb @dims