-
Notifications
You must be signed in to change notification settings - Fork 5.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
wg-lts: add #2911
wg-lts: add #2911
Conversation
@tpepper: GitHub didn't allow me to request PR reviews from the following users: nickyoung. Note that only kubernetes members and repo collaborators can review this PR, and authors cannot review their own PRs. In response to this: Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/assign @jdumars @calebamiles |
/committee steering |
This may be a controversial issue but I, for one, welcome our long-term-supporting overlords. And coming from a medical software background, +10000000 |
/lgtm I like detailed charters. Otherwise new people do not have enough context on the "vision/charter". |
wg-lts/charter.md
Outdated
* SIG Cloud Provider | ||
* SIG Testing | ||
* SIG Architecture & Steering Committee | ||
* ...arguably all SIGs in as much as proposals may impact the way the community developers, ships and maintains its code |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
SIGs API Machinery, CLI, and Node would be affected, in particular, if supported version skew were to change.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I can easily add these, but also wonder: In the sense of this being a WG not a SIG and thus not owning code, and KEPs being the form of any possible eventual change proposals...how specific should we be in this document? As I start adding, I can imagine additional arguments for why basically every SIG is a stakeholder, and even a blocking stakeholder in some cases. But somehow I think we need to differentiate between inputs / stakeholder involvement and outputs / blocking stakeholders.
Per-KEP I can imagine the possibility of some being more targeted and shorter stakeholder list, and some that would truly be all SIGs are blocking stakeholders on approval. I'd like to pragmatically allow that, and here in the document be indicating the intent to be as maximally inclusive as possible, without having to list every SIG and keep the list up to date as the SIG list morphs over the coming year.
If any wordsmiths have a solid proposal on how to do that I'd love suggestions.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Many of the stakeholders listed are not blocking stakeholders.
If you plan to seriously investigate the issue of version skew, then the SIGs I mentioned need to be consulted. I think they're far more significant than, say, SIG cloud provider. You can omit them from the doc, but that wouldn't give me confidence in the outcome of the WG.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
cc @jagosan
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Added SIGs API Machinery, CLI, and Node.
Also revamped this stakeholders section based on feedback from folks in the first WG LTS meeting (https://youtu.be/i1sCgfLFU-I?list=PL69nYSiGNLP13_zDqYfUjfLZ2Lu9a3pv-).
wg-lts/charter.md
Outdated
* Kubernetes end users | ||
* Kubernetes cluster operators | ||
* Kubernetes vendors, distributions, and hosting providers | ||
* SIG Release |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
And the Security team
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This reminds me. The "security team" is not super discoverable right now. There's the new wg-security-audit here in the community repo and semi-buried in the sig-release repo: https://git.k8s.io/sig-release/security-release-process-documentation/security-release-process.md#product-security-team-pst
Do we need a better linkage and discoverability on that in the community repo?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Probably, yes
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Added PST.
wg-lts/charter.md
Outdated
"WG LTS" is simply shorter than "WG To LTS Or Not To LTS" or "WG | ||
What Are We Releasing And Why And How Is It Best Integrated, Validate, | ||
And Supported", but should NOT be read in that shortness to imply | ||
establishing a traditional LTS scheme is the foregone conclusion of |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
What is the user benefit that you think might be realized via LTS? What do you mean by "traditional LTS"? While the latter might be an output of the working group, it would be useful to state the former here.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Without getting super verbose on it, would a change from "traditional LTS scheme" to "traditional LTS scheme (multi-year support lifecycle)" be sufficient clarification?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
That's a little better, but some implications, such as upgradability or lack thereof are unclear. I think the presentation was more clear. You could link to it.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Added link, and more perhaps clarifying wording around "traditional LTS scheme".
I've pushed some edits belatedly in response to feedback. KubeCon China and the US Thanksgiving holiday got me behind on things. |
/cc |
sigs.yaml
Outdated
mission_statement: > | ||
Provide a cross SIG location for focused collection of | ||
stakeholder feedback regarding the support stance of Kubernetes | ||
project in order to inform proposals for support improvements. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This mission statement is too vague. I suggest: "Answer the question: Does Kubernetes need a LTS (long-term-support) concept? If yes, figure out what that looks like for Kubernetes and propose this to the rest of the project. If no, figure out how to help end users cope with this and propose that to the rest of the project. If a proposal is accepted, the working group's mission will change to implement it."
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I like this wording's specificity.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
+1 from me on that.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm ok with the mission, but the name LTS
doesn't necessarily align with the mission.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can you actually change the mission statement in the document? I would like to lgtm.
LTS
as a name maybe assumes the answer a little bit, but I don't think grammar forces you to interpret it that way, and it's hard to think of a better one. "wg-should-we-lts" and "wg-lts-or-not" don't exactly roll off the tongue.
As long as the mission statement is clear I think the name isn't a showstopper.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
After some out-of-band discussion I'm going to amend with what is hopefully better word choice for all:
Answer the question: Does Kubernetes need a longer support term? If yes, figure out what that looks like for Kubernetes and propose this to the rest of the project. If no, figure out how to help end users cope with this and propose that to the rest of the project. If a proposal is accepted, the working group's mission will change to implement it.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
"will change to implement it" ... we probably should add that this would be by working with/in relevant sigs
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The new wording SGTM. +1
for the release engineering operations and automation, but does not | ||
own code itself. | ||
* Code, test case, automation implementations: this is a working | ||
group, no code implementation is the responsibility of this Working |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
WGs don't own code, but that doesn't mean you can't write or fix it.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Minor nits, but non-blocking IMO
/lgtm
OWNERS_ALIASES
Outdated
@@ -66,7 +66,7 @@ aliases: | |||
- brancz | |||
sig-multicluster-leads: | |||
- csbell | |||
- quinton-hoole | |||
- quinton-hoole-2 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The deets on multi-cluster should be a separate PR imo.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Definitely at this point should've gone in on it's own a long time ago. I've moved that commit to #3184
sigs.yaml
Outdated
mission_statement: > | ||
Provide a cross SIG location for focused collection of | ||
stakeholder feedback regarding the support stance of Kubernetes | ||
project in order to inform proposals for support improvements. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm ok with the mission, but the name LTS
doesn't necessarily align with the mission.
* SIG API Machinery | ||
* SIG CLI | ||
* SIG Node | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
What SIG is not a stakeholder? You might want to omit this section.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
These specific SIGs would be most impacted by changes to our version-skew policies or upgrade/downgrade procedures.
But at this point, they are all aware this is happening, and will be looped into any resulting KEPs as appropriate, so I agree it's less necessary to include.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We need a list of SIGs so know from a process perspective whose lgtms are needed to move this forward. "Everyone" is untenable. I would consider which sigs are most likely to be actively involved in these discussions.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
could this be handled as SIG Release being a primary stakeholder and stamper, while a note is added that any SIG can be potential stakeholders if a problem demands them to be?
scenario:
- a SIG finds a problem, they send a PR for an LTS branch.
- PR is stamped by said SIG, but final stamp is by SIG release.
with SIG Release in the above context i see the obvious requirement for a formation of a group that handles the LTS patch management and security evaluation of backports (AKA LTS release team).
/lgtm +1 on forming WG-LTS to discuss the possibility of having K8s LTS, hence make a rational go or no-go decision. |
As per October 2018 discussion in SIG Release, k-dev mailing list, etc., here's our proposal for the working group around evaluating our support stance and making proposals for improvements. While not required for a working group, this commit proposes an initial charter for the WG LTS as this one has a notable potential to at best bikeshed and at worst get mired in contention. Documenting scope, goals, deliverables seems like a reasonable way to aim for a collaborative analysis of where we are and constructive suggestions toward improvement. Signed-off-by: Tim Pepper <tpepper@vmware.com>
/lgtm I think enough people are signed on to merge this. Further changes can be made in follow-ups. |
@lavalamp: changing LGTM is restricted to assignees, and assigning you to the PR failed. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: imkin, lavalamp, soltysh, timothysc, tpepper The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
I seem to not have powers here, though. |
@lavalamp too many assignees. github limits to 10 /lgtm |
@cblecker maybe it is waiting for "/hold cancel" |
/hold cancel |
SIG sign-off was step one. This also needed sign-off from a simple majority of steering committee. I don't think that will be a problem but will go ask for lgtm's just to cross t's and dot i's. Thus far we have 4 (@spiffxp, @dims, @timothysc, @bgrant0607) out of 12. So we need 3 more |
/lgtm |
2 similar comments
/lgtm |
/lgtm |
That's our 3 more. Simple majority of steering has agreed this WG should move forward. Thanks all. |
As per October 2018 discussion in SIG Release, k-dev mailing list,
etc., here's our proposal for the working group around evaluating
our support stance and making proposals for improvements.
While not required for a working group, this commit proposes an
initial charter for the WG LTS as this one has a notable potential
to at best bikeshed and at worst get mired in contention. Documenting
scope, goals, deliverables seems like a reasonable way to aim for
a collaborative analysis of where we are and constructive suggestions
toward improvement.
Signed-off-by: Tim Pepper tpepper@vmware.com