Skip to content

[WIP] [Generated] Introduce preemption gates to workloads and add a single cluster preemption timeout configuration#9279

Open
gizemo-bot wants to merge 41 commits intokubernetes-sigs:mainfrom
gizemo-bot:pr-8985
Open

[WIP] [Generated] Introduce preemption gates to workloads and add a single cluster preemption timeout configuration#9279
gizemo-bot wants to merge 41 commits intokubernetes-sigs:mainfrom
gizemo-bot:pr-8985

Conversation

@gizemo-bot
Copy link

@gizemo-bot gizemo-bot commented Feb 16, 2026

What type of PR is this?

/kind feature

What this PR does / why we need it:

This is an attempt to implement keps/8303-multikueue-orchestrated-preemption

Which issue(s) this PR fixes:

This is to understand the limits of code assistants as of today

Special notes for your reviewer:

This is a generated code, please review accordingly

Does this PR introduce a user-facing change?

NONE


@k8s-ci-robot
Copy link
Contributor

Adding the "do-not-merge/release-note-label-needed" label because no release-note block was detected, please follow our release note process to remove it.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@k8s-ci-robot k8s-ci-robot added the do-not-merge/release-note-label-needed Indicates that a PR should not merge because it's missing one of the release note labels. label Feb 16, 2026
@netlify
Copy link

netlify bot commented Feb 16, 2026

Deploy Preview for kubernetes-sigs-kueue canceled.

Name Link
🔨 Latest commit 152773a
🔍 Latest deploy log https://app.netlify.com/projects/kubernetes-sigs-kueue/deploys/6993203b7146e800086aa0f1

@linux-foundation-easycla
Copy link

linux-foundation-easycla bot commented Feb 16, 2026

CLA Signed

The committers listed above are authorized under a signed CLA.

@k8s-ci-robot
Copy link
Contributor

Welcome @gizemo-bot!

It looks like this is your first PR to kubernetes-sigs/kueue 🎉. Please refer to our pull request process documentation to help your PR have a smooth ride to approval.

You will be prompted by a bot to use commands during the review process. Do not be afraid to follow the prompts! It is okay to experiment. Here is the bot commands documentation.

You can also check if kubernetes-sigs/kueue has its own contribution guidelines.

You may want to refer to our testing guide if you run into trouble with your tests not passing.

If you are having difficulty getting your pull request seen, please follow the recommended escalation practices. Also, for tips and tricks in the contribution process you may want to read the Kubernetes contributor cheat sheet. We want to make sure your contribution gets all the attention it needs!

Thank you, and welcome to Kubernetes. 😃

@k8s-ci-robot k8s-ci-robot added the needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. label Feb 16, 2026
@k8s-ci-robot
Copy link
Contributor

Hi @gizemo-bot. Thanks for your PR.

I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@k8s-ci-robot k8s-ci-robot added the cncf-cla: no Indicates the PR's author has not signed the CNCF CLA. label Feb 16, 2026
@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: gizemo-bot
Once this PR has been reviewed and has the lgtm label, please assign gabesaba for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. and removed cncf-cla: no Indicates the PR's author has not signed the CNCF CLA. labels Feb 16, 2026
@gizemo-bot gizemo-bot changed the title Pr 8985 [WIP] [Generated] Introduce preemption gates to workloads and add a single cluster preemption timeout configuration Feb 16, 2026
@k8s-ci-robot k8s-ci-robot added the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label Feb 16, 2026
@mimowo
Copy link
Contributor

mimowo commented Feb 16, 2026

@kshalot we don't have yet a clear policy for commits co-authored by agents, could you for now open a PR on your behalf?

We need to figure this out, cc @tenzen-y @kannon92

@gizemo-bot
Copy link
Author

@kshalot we don't have yet a clear policy for commits co-authored by agents, could you for now open a PR on your behalf?

We need to figure this out, cc @tenzen-y @kannon92

Hey sorry for the confusion, it is me Gizem playing around with this KEP. I'm not planning to merge this just checking the limits. And at the same time, it could be good to have a plan ready I guess, since soon we will face this kind of PRs

@kshalot
Copy link
Contributor

kshalot commented Feb 16, 2026

@gizemo-bot Sidenote - maybe you can open a PR in the fork repo (https://github.com/gizemo-bot/kueue) instead of here. Then it won't be pinging any maintainers etc.

@gizemo-bot
Copy link
Author

@gizemo-bot Sidenote - maybe you can open a PR in the fork repo (https://github.com/gizemo-bot/kueue) instead of here. Then it won't be pinging any maintainers etc.

Yes that was the plan which was not followed by the bot:) Should I move there, planning 1-2 more commits at most.

@tenzen-y
Copy link
Member

@kshalot we don't have yet a clear policy for commits co-authored by agents, could you for now open a PR on your behalf?

We need to figure this out, cc @tenzen-y @kannon92

AFAIK, we previously brought this topic to the steering committee, but no decision has been made yet.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. do-not-merge/release-note-label-needed Indicates that a PR should not merge because it's missing one of the release note labels. do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants