Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

wg-lts: add #2911

Merged
merged 1 commit into from
Feb 1, 2019
Merged

wg-lts: add #2911

merged 1 commit into from
Feb 1, 2019

Conversation

tpepper
Copy link
Member

@tpepper tpepper commented Nov 7, 2018

As per October 2018 discussion in SIG Release, k-dev mailing list,
etc., here's our proposal for the working group around evaluating
our support stance and making proposals for improvements.

While not required for a working group, this commit proposes an
initial charter for the WG LTS as this one has a notable potential
to at best bikeshed and at worst get mired in contention. Documenting
scope, goals, deliverables seems like a reasonable way to aim for
a collaborative analysis of where we are and constructive suggestions
toward improvement.

Signed-off-by: Tim Pepper tpepper@vmware.com

@k8s-ci-robot k8s-ci-robot added size/L Denotes a PR that changes 100-499 lines, ignoring generated files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. labels Nov 7, 2018
@tpepper
Copy link
Member Author

tpepper commented Nov 7, 2018

/cc @imkin @nickyoung @quinton-hoole

@k8s-ci-robot k8s-ci-robot requested review from imkin and a user November 7, 2018 01:11
@k8s-ci-robot
Copy link
Contributor

@tpepper: GitHub didn't allow me to request PR reviews from the following users: nickyoung.

Note that only kubernetes members and repo collaborators can review this PR, and authors cannot review their own PRs.

In response to this:

/cc @imkin @nickyoung @quinton-hoole

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@tpepper
Copy link
Member Author

tpepper commented Nov 7, 2018

/assign @jdumars @calebamiles

@cblecker
Copy link
Member

cblecker commented Nov 7, 2018

/committee steering
cc: @kubernetes/steering-committee

@k8s-ci-robot k8s-ci-robot added the committee/steering Denotes an issue or PR intended to be handled by the steering committee. label Nov 7, 2018
@jeefy
Copy link
Member

jeefy commented Nov 7, 2018

This may be a controversial issue but I, for one, welcome our long-term-supporting overlords.

And coming from a medical software background, +10000000

sig-list.md Outdated Show resolved Hide resolved
@k8s-ci-robot k8s-ci-robot added the sig/multicluster Categorizes an issue or PR as relevant to SIG Multicluster. label Nov 7, 2018
@imkin
Copy link

imkin commented Nov 7, 2018

/lgtm

I like detailed charters. Otherwise new people do not have enough context on the "vision/charter".
Thanks for the verbosity @tpepper

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Nov 7, 2018
* SIG Cloud Provider
* SIG Testing
* SIG Architecture & Steering Committee
* ...arguably all SIGs in as much as proposals may impact the way the community developers, ships and maintains its code
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

SIGs API Machinery, CLI, and Node would be affected, in particular, if supported version skew were to change.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I can easily add these, but also wonder: In the sense of this being a WG not a SIG and thus not owning code, and KEPs being the form of any possible eventual change proposals...how specific should we be in this document? As I start adding, I can imagine additional arguments for why basically every SIG is a stakeholder, and even a blocking stakeholder in some cases. But somehow I think we need to differentiate between inputs / stakeholder involvement and outputs / blocking stakeholders.

Per-KEP I can imagine the possibility of some being more targeted and shorter stakeholder list, and some that would truly be all SIGs are blocking stakeholders on approval. I'd like to pragmatically allow that, and here in the document be indicating the intent to be as maximally inclusive as possible, without having to list every SIG and keep the list up to date as the SIG list morphs over the coming year.

If any wordsmiths have a solid proposal on how to do that I'd love suggestions.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Many of the stakeholders listed are not blocking stakeholders.

If you plan to seriously investigate the issue of version skew, then the SIGs I mentioned need to be consulted. I think they're far more significant than, say, SIG cloud provider. You can omit them from the doc, but that wouldn't give me confidence in the outcome of the WG.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Added SIGs API Machinery, CLI, and Node.

Also revamped this stakeholders section based on feedback from folks in the first WG LTS meeting (https://youtu.be/i1sCgfLFU-I?list=PL69nYSiGNLP13_zDqYfUjfLZ2Lu9a3pv-).

* Kubernetes end users
* Kubernetes cluster operators
* Kubernetes vendors, distributions, and hosting providers
* SIG Release
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

And the Security team

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This reminds me. The "security team" is not super discoverable right now. There's the new wg-security-audit here in the community repo and semi-buried in the sig-release repo: https://git.k8s.io/sig-release/security-release-process-documentation/security-release-process.md#product-security-team-pst

Do we need a better linkage and discoverability on that in the community repo?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Probably, yes

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Added PST.

wg-lts/charter.md Outdated Show resolved Hide resolved
"WG LTS" is simply shorter than "WG To LTS Or Not To LTS" or "WG
What Are We Releasing And Why And How Is It Best Integrated, Validate,
And Supported", but should NOT be read in that shortness to imply
establishing a traditional LTS scheme is the foregone conclusion of
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

What is the user benefit that you think might be realized via LTS? What do you mean by "traditional LTS"? While the latter might be an output of the working group, it would be useful to state the former here.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Without getting super verbose on it, would a change from "traditional LTS scheme" to "traditional LTS scheme (multi-year support lifecycle)" be sufficient clarification?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

That's a little better, but some implications, such as upgradability or lack thereof are unclear. I think the presentation was more clear. You could link to it.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Added link, and more perhaps clarifying wording around "traditional LTS scheme".

@bgrant0607 bgrant0607 added the sig/architecture Categorizes an issue or PR as relevant to SIG Architecture. label Nov 8, 2018
@k8s-ci-robot k8s-ci-robot removed the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Nov 27, 2018
@tpepper
Copy link
Member Author

tpepper commented Nov 27, 2018

I've pushed some edits belatedly in response to feedback. KubeCon China and the US Thanksgiving holiday got me behind on things.

@justaugustus
Copy link
Member

/cc

sigs.yaml Outdated
mission_statement: >
Provide a cross SIG location for focused collection of
stakeholder feedback regarding the support stance of Kubernetes
project in order to inform proposals for support improvements.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This mission statement is too vague. I suggest: "Answer the question: Does Kubernetes need a LTS (long-term-support) concept? If yes, figure out what that looks like for Kubernetes and propose this to the rest of the project. If no, figure out how to help end users cope with this and propose that to the rest of the project. If a proposal is accepted, the working group's mission will change to implement it."

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I like this wording's specificity.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

+1 from me on that.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm ok with the mission, but the name LTS doesn't necessarily align with the mission.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can you actually change the mission statement in the document? I would like to lgtm.

LTS as a name maybe assumes the answer a little bit, but I don't think grammar forces you to interpret it that way, and it's hard to think of a better one. "wg-should-we-lts" and "wg-lts-or-not" don't exactly roll off the tongue.

As long as the mission statement is clear I think the name isn't a showstopper.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

After some out-of-band discussion I'm going to amend with what is hopefully better word choice for all:

Answer the question: Does Kubernetes need a longer support term? If yes, figure out what that looks like for Kubernetes and propose this to the rest of the project. If no, figure out how to help end users cope with this and propose that to the rest of the project. If a proposal is accepted, the working group's mission will change to implement it.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

"will change to implement it" ... we probably should add that this would be by working with/in relevant sigs

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The new wording SGTM. +1

for the release engineering operations and automation, but does not
own code itself.
* Code, test case, automation implementations: this is a working
group, no code implementation is the responsibility of this Working
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

WGs don't own code, but that doesn't mean you can't write or fix it.

Copy link
Member

@timothysc timothysc left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Minor nits, but non-blocking IMO
/lgtm

OWNERS_ALIASES Outdated
@@ -66,7 +66,7 @@ aliases:
- brancz
sig-multicluster-leads:
- csbell
- quinton-hoole
- quinton-hoole-2
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The deets on multi-cluster should be a separate PR imo.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Definitely at this point should've gone in on it's own a long time ago. I've moved that commit to #3184

sigs.yaml Outdated
mission_statement: >
Provide a cross SIG location for focused collection of
stakeholder feedback regarding the support stance of Kubernetes
project in order to inform proposals for support improvements.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm ok with the mission, but the name LTS doesn't necessarily align with the mission.

* SIG API Machinery
* SIG CLI
* SIG Node

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

What SIG is not a stakeholder? You might want to omit this section.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

These specific SIGs would be most impacted by changes to our version-skew policies or upgrade/downgrade procedures.

But at this point, they are all aware this is happening, and will be looped into any resulting KEPs as appropriate, so I agree it's less necessary to include.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We need a list of SIGs so know from a process perspective whose lgtms are needed to move this forward. "Everyone" is untenable. I would consider which sigs are most likely to be actively involved in these discussions.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

could this be handled as SIG Release being a primary stakeholder and stamper, while a note is added that any SIG can be potential stakeholders if a problem demands them to be?

scenario:

  • a SIG finds a problem, they send a PR for an LTS branch.
  • PR is stamped by said SIG, but final stamp is by SIG release.

with SIG Release in the above context i see the obvious requirement for a formation of a group that handles the LTS patch management and security evaluation of backports (AKA LTS release team).

@k8s-ci-robot k8s-ci-robot added lgtm "Looks good to me", indicates that a PR is ready to be merged. approved Indicates a PR has been approved by an approver from all required OWNERS files. labels Jan 30, 2019
@k8s-ci-robot k8s-ci-robot removed the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Jan 31, 2019
@dchen1107
Copy link
Member

/lgtm

+1 on forming WG-LTS to discuss the possibility of having K8s LTS, hence make a rational go or no-go decision.

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Feb 1, 2019
As per October 2018 discussion in SIG Release, k-dev mailing list,
etc., here's our proposal for the working group around evaluating
our support stance and making proposals for improvements.

While not required for a working group, this commit proposes an
initial charter for the WG LTS as this one has a notable potential
to at best bikeshed and at worst get mired in contention.  Documenting
scope, goals, deliverables seems like a reasonable way to aim for
a collaborative analysis of where we are and constructive suggestions
toward improvement.

Signed-off-by: Tim Pepper <tpepper@vmware.com>
@k8s-ci-robot k8s-ci-robot removed the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Feb 1, 2019
@lavalamp
Copy link
Member

lavalamp commented Feb 1, 2019

/lgtm
/approve

I think enough people are signed on to merge this. Further changes can be made in follow-ups.

@k8s-ci-robot
Copy link
Contributor

@lavalamp: changing LGTM is restricted to assignees, and assigning you to the PR failed.

In response to this:

/lgtm
/approve

I think enough people are signed on to merge this. Further changes can be made in follow-ups.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: imkin, lavalamp, soltysh, timothysc, tpepper

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@lavalamp
Copy link
Member

lavalamp commented Feb 1, 2019

I seem to not have powers here, though.

@cblecker
Copy link
Member

cblecker commented Feb 1, 2019

@lavalamp too many assignees. github limits to 10

/lgtm

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Feb 1, 2019
@imkin
Copy link

imkin commented Feb 1, 2019

@cblecker maybe it is waiting for "/hold cancel"

@dims
Copy link
Member

dims commented Feb 1, 2019

/hold cancel

@k8s-ci-robot k8s-ci-robot removed the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Feb 1, 2019
@k8s-ci-robot k8s-ci-robot merged commit 87db6fe into kubernetes:master Feb 1, 2019
@spiffxp
Copy link
Member

spiffxp commented Feb 2, 2019

SIG sign-off was step one. This also needed sign-off from a simple majority of steering committee. I don't think that will be a problem but will go ask for lgtm's just to cross t's and dot i's.

Thus far we have 4 (@spiffxp, @dims, @timothysc, @bgrant0607) out of 12. So we need 3 more

@smarterclayton
Copy link
Contributor

/lgtm

2 similar comments
@derekwaynecarr
Copy link
Member

/lgtm

@jbeda
Copy link
Contributor

jbeda commented Feb 5, 2019

/lgtm

@spiffxp
Copy link
Member

spiffxp commented Feb 5, 2019

That's our 3 more. Simple majority of steering has agreed this WG should move forward. Thanks all.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. committee/steering Denotes an issue or PR intended to be handled by the steering committee. lgtm "Looks good to me", indicates that a PR is ready to be merged. sig/architecture Categorizes an issue or PR as relevant to SIG Architecture. sig/multicluster Categorizes an issue or PR as relevant to SIG Multicluster. size/L Denotes a PR that changes 100-499 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.