Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Prep for v0.3.0 release #113

Merged

Conversation

DirectXMan12
Copy link
Contributor

@DirectXMan12 DirectXMan12 commented Aug 22, 2018

This preps for the v0.3.0 release by adding example deployment
manifests for the development release, a note in the README, and flag
documentation to the README.

@k8s-ci-robot k8s-ci-robot added size/L Denotes a PR that changes 100-499 lines, ignoring generated files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. labels Aug 22, 2018
@DirectXMan12
Copy link
Contributor Author

@serathius @brancz some quick improvements to the README before tagging an alpha.

Will tag the alpha once this merges.

emptyDir: {}
containers:
- name: metrics-server
image: gcr.io/google_containers/metrics-server-amd64
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

image descriptors without tag often cause problem, we should be explicit here

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

the intention is that these are used to deploy pre-release versions, or things like that. Since we don't actually specify different options in the manifest, I'm not certain it's strictly necessary to have them, but I don't think a tag makes much sense here.

@@ -21,6 +21,7 @@ Compatibility matrix:

Metrics Server | Metrics API group/version | Supported Kubernetes version
---------------|---------------------------|-----------------------------
0.3.x | `metrics.k8s.io/v1beta1` | 1.8+
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think new release dropped support for unsecured kubelet port, this also adds requirement for kubelet to support Token Review.
Will this change supported versions?
For example GKE does not support Token Review yet (I'm working on it, but still don't have confirmation from mikedanese)

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If we consider rolling this version into k8s 1.12, I would prefer to have 9bb8fe9 rolled back.

We can change default behavior to use secure port, but we should not drop support for http.

Copy link
Contributor Author

@DirectXMan12 DirectXMan12 Aug 23, 2018

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Will this change supported versions?

It shouldn't change the supported versions, since Kubernetes has supported kubelet token review for a while, IIRC (1.5ish, I think -- kubernetes/kubernetes#34381).

Plus, it doesn't require token review -- presumably, you can use kubeconfig with client certs instead. Is that insufficient?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can you provide configuration for GKE in deployment?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

talked with @serathius on slack a bit, and the upshot is that if GKE doesn't have Kubelet token support, configuration for the automated GKE tests in k/k is going to be tricky. I'm going to add the option back in, with the expectation that we'll get a timeline for it's removal in place soon.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

README.md Outdated
behavior:

- `--metric-resolution=<duration>`: the interval at which metrics will be
scraped from Kubelets.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should it mention the default?

README.md Outdated
scraped from Kubelets.

- `--kubelet-insecure-tls`: skip verifying Kubelet CA certificates. Not
reccomended for production usage, but can be useful in test clusters
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

s/reccomended/recommended

@serathius
Copy link
Contributor

serathius commented Aug 23, 2018

/cc @tallclair

@serathius
Copy link
Contributor

I'm testing image before release and I noticed behavior that metrics server is always reporting 1m window, even if I change metric-resolution to different values.

@DirectXMan12
Copy link
Contributor Author

Yeah, we used to hard code the window, so I kept that behavior. I've got a PR that changes it to be closer to the underlying summary window, but since the summary API doesn't report the actual window size (it could, but it doesn't), we just have to fix at the max the summary can give (with is 30s, since max-housekeeping is 15s, and the jitter logic can double that).

@DirectXMan12
Copy link
Contributor Author

(and changing the "metrics-resolution" doesn't actually change the window size, since we're pulling usage rate from the summary API)

@serathius
Copy link
Contributor

/cc @kawych

@DirectXMan12 DirectXMan12 changed the title Prep for v0.3.0 alpha 1 release Prep for v0.3.0 release Aug 27, 2018
This preps for the v0.3.0 release by adding, a note in the README, and flag
documentation to the README.  Changing the manifest versions will come
once the image is published.
@k8s-ci-robot k8s-ci-robot added size/M Denotes a PR that changes 30-99 lines, ignoring generated files. and removed size/L Denotes a PR that changes 100-499 lines, ignoring generated files. labels Aug 29, 2018
@DirectXMan12 DirectXMan12 merged commit 668f948 into kubernetes-sigs:master Aug 29, 2018
@DirectXMan12 DirectXMan12 deleted the release/v0.3.0-alpha.1 branch August 29, 2018 16:54
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. size/M Denotes a PR that changes 30-99 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants