diff --git a/keps/prod-readiness/sig-storage/4547.yaml b/keps/prod-readiness/sig-storage/4547.yaml new file mode 100644 index 00000000000..8332e6670ad --- /dev/null +++ b/keps/prod-readiness/sig-storage/4547.yaml @@ -0,0 +1,3 @@ +kep-number: 4547 +alpha: + approver: "@jpbetz" diff --git a/keps/sig-storage/4547-in-tree-volume-plugins-remove-dynamic-provisioning-support/README.md b/keps/sig-storage/4547-in-tree-volume-plugins-remove-dynamic-provisioning-support/README.md new file mode 100644 index 00000000000..80346ac8701 --- /dev/null +++ b/keps/sig-storage/4547-in-tree-volume-plugins-remove-dynamic-provisioning-support/README.md @@ -0,0 +1,898 @@ + +# KEP-4547: In-tree volume plugins remove dynamic provisioning support + + + + + + +- [Release Signoff Checklist](#release-signoff-checklist) +- [Summary](#summary) +- [Motivation](#motivation) + - [Goals](#goals) + - [Non-Goals](#non-goals) +- [Proposal](#proposal) + - [User Stories (Optional)](#user-stories-optional) + - [Story 1](#story-1) + - [Story 2](#story-2) + - [Notes/Constraints/Caveats (Optional)](#notesconstraintscaveats-optional) + - [Risks and Mitigations](#risks-and-mitigations) +- [Design Details](#design-details) + - [Test Plan](#test-plan) + - [Prerequisite testing updates](#prerequisite-testing-updates) + - [Unit tests](#unit-tests) + - [Integration tests](#integration-tests) + - [e2e tests](#e2e-tests) + - [Graduation Criteria](#graduation-criteria) + - [Upgrade / Downgrade Strategy](#upgrade--downgrade-strategy) + - [Version Skew Strategy](#version-skew-strategy) +- [Production Readiness Review Questionnaire](#production-readiness-review-questionnaire) + - [Feature Enablement and Rollback](#feature-enablement-and-rollback) + - [Rollout, Upgrade and Rollback Planning](#rollout-upgrade-and-rollback-planning) + - [Monitoring Requirements](#monitoring-requirements) + - [Dependencies](#dependencies) + - [Scalability](#scalability) + - [Troubleshooting](#troubleshooting) +- [Implementation History](#implementation-history) +- [Drawbacks](#drawbacks) +- [Alternatives](#alternatives) +- [Infrastructure Needed (Optional)](#infrastructure-needed-optional) + + +## Release Signoff Checklist + + + +Items marked with (R) are required *prior to targeting to a milestone / release*. + +- [ ] (R) Enhancement issue in release milestone, which links to KEP dir in [kubernetes/enhancements] (not the initial KEP PR) +- [ ] (R) KEP approvers have approved the KEP status as `implementable` +- [ ] (R) Design details are appropriately documented +- [ ] (R) Test plan is in place, giving consideration to SIG Architecture and SIG Testing input (including test refactors) + - [ ] e2e Tests for all Beta API Operations (endpoints) + - [ ] (R) Ensure GA e2e tests meet requirements for [Conformance Tests](https://github.com/kubernetes/community/blob/master/contributors/devel/sig-architecture/conformance-tests.md) + - [ ] (R) Minimum Two Week Window for GA e2e tests to prove flake free +- [ ] (R) Graduation criteria is in place + - [ ] (R) [all GA Endpoints](https://github.com/kubernetes/community/pull/1806) must be hit by [Conformance Tests](https://github.com/kubernetes/community/blob/master/contributors/devel/sig-architecture/conformance-tests.md) +- [ ] (R) Production readiness review completed +- [ ] (R) Production readiness review approved +- [ ] "Implementation History" section is up-to-date for milestone +- [ ] User-facing documentation has been created in [kubernetes/website], for publication to [kubernetes.io] +- [ ] Supporting documentation—e.g., additional design documents, links to mailing list discussions/SIG meetings, relevant PRs/issues, release notes + + + +[kubernetes.io]: https://kubernetes.io/ +[kubernetes/enhancements]: https://git.k8s.io/enhancements +[kubernetes/kubernetes]: https://git.k8s.io/kubernetes +[kubernetes/website]: https://git.k8s.io/website + +## Summary + + + +Remove dynamic provisioning support from the hostPath in-tree volume plugin. And after the migration plan of the portworxVolume plugin is completed, the kube-controller-manager component should remove command line flags related to dynamic provisioning. Only external provisioners (e.g. CSI) will support dynamic provisioning. + +## Motivation + + + +Dynamic volume provisioning allows storage volumes to be created on-demand. In Kubernetes 1.30, only the following in-tree volume plugins support dynamic provisioning: + +- portworxVolume +- hostPath + +The csi migration plan for portworxVolume is tracked in [KEP-2589](../2589-csi-migration-portworx). Once the migration is completed, the portworxVolume plugin would be removed in a future release. + +For the hostPath volume plugin, dynamic provisioning is only used for test and development purposes. The [csi-driver-host-path](https://github.com/kubernetes-csi/csi-driver-host-path) project is a sample (non-production) CSI Driver that creates a local directory as a volume on a single node. It is good alternative for same purpose. If you are using kind to create a cluster, the [local-path-provisioner](https://github.com/rancher/local-path-provisioner) is another good alternative and it is installed by default in kind. + +If the migration is complete and the dynamic provisioning support is removed from the hostPath in-tree volume plugin, all in-tree volume plugins will no longer support dynamic provisioning. As a result, the kube-controller-manager component can remove command line flags related to dynamic provisioning. It makes the kube-controller-manager component simpler and easier to maintain. Only external provisioners (e.g. CSI) will support dynamic provisioning. + +### Goals + + + +- Deprecate and remove dynamic provisioning support from the hostPath in-tree volume plugin. +- The kube-controller-manager component removes command line flags related to dynamic provisioning. + +### Non-Goals + + + +- This KEP does not cover the migration of in-tree volume plugins to CSI. + Please refer to the [KEP-625](../625-csi-migration) for the migration plan and subsequent KEPs for the migration of individual in-tree volume plugins. +- Which external provisioner will be used to support dynamic provisioning for testing and development purposes. It is up to the user to choose the appropriate external provisioner. + +## Proposal + + + +### User Stories (Optional) + + + +N/A + +### Notes/Constraints/Caveats (Optional) + + + +### Risks and Mitigations + + + + +## Design Details + + + +Currently, the PersistentVolume binder controller in kube-controller-manager is +responsible for binding a Persistent Volume Claim (PVC) to a Persistent Volume (PV). +During the binding process, if no suitable PV is found, the controller will +dynamically provision a new PV. + +The dynamic provisioning support is implemented in the in-tree volume plugins. The +kube-controller-manager component has command line flags to enable or disable dynamic +provisioning for in-tree volume plugins. + +- The `--enable-hostpath-provisioner` flag enable HostPath PV provisioning when running + without a cloud provider. This allows testing and development of provisioning features. + HostPath provisioning is not supported in any way, won't work in a multi-node cluster, + and should not be used for anything other than testing or development. +- The `--enable-dynamic-provisioning` flag enable dynamic provisioning for environments + that support it. + +Once the migration plan of the portworxVolume plugin is completed, only the hostPath +in-tree volume plugin will support dynamic provisioning. The dynamic provisioning support +of the hostPath in-tree volume plugin is designed for testing and development purposes. +There are some alternatives such as the [csi-driver-host-path](https://github.com/kubernetes-csi/csi-driver-host-path) +, [local-path-provisioner](https://github.com/rancher/local-path-provisioner) and etc. +End users can choose the appropriate external provisioner for testing and development purposes. +So, it is safe to remove the dynamic provisioning support from the hostPath in-tree volume plugin. + +Then, the kube-controller-manager component should deprecate the `--enable-hostpath-provisioner` +and `--enable-dynamic-provisioning` flags. In a future release, the kube-controller-manager +component should remove these flags. + +### Test Plan + + + +[x] I/we understand the owners of the involved components may require updates to +existing tests to make this code solid enough prior to committing the changes necessary +to implement this enhancement. + +##### Prerequisite testing updates + + + +##### Unit tests + + + + + +Not needed for this KEP. no new features are added. + +##### Integration tests + + + + + +Not needed for this KEP. no new features are added. + +##### e2e tests + + + +Not needed for this KEP. no new features are added. + +### Graduation Criteria + + + +### Upgrade / Downgrade Strategy + + + +### Version Skew Strategy + + + +## Production Readiness Review Questionnaire + + + +### Feature Enablement and Rollback + + + +###### How can this feature be enabled / disabled in a live cluster? + + + +- [ ] Feature gate (also fill in values in `kep.yaml`) + - Feature gate name: + - Components depending on the feature gate: +- [x] Other + - Describe the mechanism: Mark the related flags as deprecated. During the deprecation period, the feature is still available but will be removed in a future release. + - Will enabling / disabling the feature require downtime of the control + plane? + - Will enabling / disabling the feature require downtime or reprovisioning + of a node? + +###### Does enabling the feature change any default behavior? + + + +During the deprecation period, the feature is still available. + +###### Can the feature be disabled once it has been enabled (i.e. can we roll back the enablement)? + + + +N/A + +###### What happens if we reenable the feature if it was previously rolled back? + +N/A + +###### Are there any tests for feature enablement/disablement? + + + +Some unit tests and integration tests will be removed. + +### Rollout, Upgrade and Rollback Planning + + + +###### How can a rollout or rollback fail? Can it impact already running workloads? + + + +N/A + +###### What specific metrics should inform a rollback? + + + +N/A + +###### Were upgrade and rollback tested? Was the upgrade->downgrade->upgrade path tested? + + + +N/A + +###### Is the rollout accompanied by any deprecations and/or removals of features, APIs, fields of API types, flags, etc.? + + + +The kube-controller-manager component will deprecate the `--enable-hostpath-provisioner` and `--enable-dynamic-provisioning` flags. In a future release, the kube-controller-manager component should remove these flags. + +### Monitoring Requirements + + + +###### How can an operator determine if the feature is in use by workloads? + + + +N/A + +###### How can someone using this feature know that it is working for their instance? + + + +- [ ] Events + - Event Reason: +- [ ] API .status + - Condition name: + - Other field: +- [x] Other (treat as last resort) + - Details: A warning message will be printed when the flags are used. + +###### What are the reasonable SLOs (Service Level Objectives) for the enhancement? + + + +N/A + +###### What are the SLIs (Service Level Indicators) an operator can use to determine the health of the service? + + + +- [ ] Metrics + - Metric name: + - [Optional] Aggregation method: + - Components exposing the metric: +- [x] Other (treat as last resort) + - Details: N/A + +###### Are there any missing metrics that would be useful to have to improve observability of this feature? + + + +N/A + +### Dependencies + + + +###### Does this feature depend on any specific services running in the cluster? + + + +No + +### Scalability + + + +###### Will enabling / using this feature result in any new API calls? + + + +No + +###### Will enabling / using this feature result in introducing new API types? + + + +No + +###### Will enabling / using this feature result in any new calls to the cloud provider? + + + +No + +###### Will enabling / using this feature result in increasing size or count of the existing API objects? + + + +No + +###### Will enabling / using this feature result in increasing time taken by any operations covered by existing SLIs/SLOs? + + + +N/A + +###### Will enabling / using this feature result in non-negligible increase of resource usage (CPU, RAM, disk, IO, ...) in any components? + + + +N/A + +###### Can enabling / using this feature result in resource exhaustion of some node resources (PIDs, sockets, inodes, etc.)? + + + +N/As + +### Troubleshooting + + + +###### How does this feature react if the API server and/or etcd is unavailable? + +N/A + +###### What are other known failure modes? + + + +the existing persistent volumes provisioned by the hostPath in-tree volume plugin can not be deleted. It requires manual intervention to delete the PV. + +###### What steps should be taken if SLOs are not being met to determine the problem? + +N/A + +## Implementation History + + + +## Drawbacks + + + +## Alternatives + + + +## Infrastructure Needed (Optional) + + diff --git a/keps/sig-storage/4547-in-tree-volume-plugins-remove-dynamic-provisioning-support/kep.yaml b/keps/sig-storage/4547-in-tree-volume-plugins-remove-dynamic-provisioning-support/kep.yaml new file mode 100644 index 00000000000..0b9511bb4ab --- /dev/null +++ b/keps/sig-storage/4547-in-tree-volume-plugins-remove-dynamic-provisioning-support/kep.yaml @@ -0,0 +1,38 @@ +title: In-tree volume plugins remove dynamic provisioning support +kep-number: TBD +authors: + - "@carlory" +owning-sig: sig-storage +participating-sigs: +status: provisional +creation-date: 2024-03-14 +reviewers: + - "@xing-yang" +approvers: + - "@xing-yang" + +see-also: + - "/keps/sig-storage/625-csi-migration" +replaces: + +# The target maturity stage in the current dev cycle for this KEP. +stage: alpha + +# The most recent milestone for which work toward delivery of this KEP has been +# done. This can be the current (upcoming) milestone, if it is being actively +# worked on. +latest-milestone: "v1.31" + +# The milestone at which this feature was, or is targeted to be, at each stage. +milestone: + alpha: "v1.31" + beta: TBD + stable: TBD + +# The following PRR answers are required at alpha release +# List the feature gate name and the components for which it must be enabled +feature-gates: +disable-supported: true + +# The following PRR answers are required at beta release +metrics: