Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

KEP-4939: Support TLS in gRPC probe #5029

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

kkoch986
Copy link

@kkoch986 kkoch986 commented Jan 8, 2025

  • One-line PR description: Initial KEP for TLS support in gRPC probes

@k8s-ci-robot k8s-ci-robot added cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. kind/kep Categorizes KEP tracking issues and PRs modifying the KEP directory sig/node Categorizes an issue or PR as relevant to SIG Node. labels Jan 8, 2025
@k8s-ci-robot
Copy link
Contributor

Welcome @kkoch986!

It looks like this is your first PR to kubernetes/enhancements 🎉. Please refer to our pull request process documentation to help your PR have a smooth ride to approval.

You will be prompted by a bot to use commands during the review process. Do not be afraid to follow the prompts! It is okay to experiment. Here is the bot commands documentation.

You can also check if kubernetes/enhancements has its own contribution guidelines.

You may want to refer to our testing guide if you run into trouble with your tests not passing.

If you are having difficulty getting your pull request seen, please follow the recommended escalation practices. Also, for tips and tricks in the contribution process you may want to read the Kubernetes contributor cheat sheet. We want to make sure your contribution gets all the attention it needs!

Thank you, and welcome to Kubernetes. 😃

@k8s-ci-robot
Copy link
Contributor

Hi @kkoch986. Thanks for your PR.

I'm waiting for a kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@k8s-ci-robot k8s-ci-robot added the needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. label Jan 8, 2025
@k8s-ci-robot k8s-ci-robot added the size/XL Denotes a PR that changes 500-999 lines, ignoring generated files. label Jan 8, 2025
@aojea
Copy link
Member

aojea commented Jan 9, 2025

/ok-to-test

@k8s-ci-robot k8s-ci-robot added ok-to-test Indicates a non-member PR verified by an org member that is safe to test. and removed needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. labels Jan 9, 2025
@kkoch986 kkoch986 requested a review from aojea January 9, 2025 14:25
@kkoch986
Copy link
Author

kkoch986 commented Jan 30, 2025

pushed up one more fixup to define the config option better. @aojea any other changes i should make to get this KEP merged?

@aojea
Copy link
Member

aojea commented Jan 30, 2025

/lgtm

I think that not having a TLS option reduce significantly the usability of this probes and is worth having parity with the http probes, also the changes requested seem to be very minimal, please @bowei take a look as you were involved with the original implementation so you may have some more historic context

/assign @thockin @dchen1107

for approval

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Jan 30, 2025
@k8s-ci-robot k8s-ci-robot removed the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Jan 30, 2025
@kkoch986
Copy link
Author

oops @aojea looks like when i rebased it removed the lgtm tag sorry about that, didnt change anything just squashed the fixups down

@aojea
Copy link
Member

aojea commented Jan 30, 2025

/lgtm

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Jan 30, 2025
@thockin
Copy link
Member

thockin commented Feb 10, 2025

Ugh, I missed that this did not have PRR - you need to create a file in the prod-readiness directory to trigger PRR review.

@thockin
Copy link
Member

thockin commented Feb 10, 2025

I am LGTM, but we need a sig-node approver

/lgtm

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Feb 10, 2025
@mrunalp
Copy link
Contributor

mrunalp commented Feb 10, 2025

I can make a pass at this one. Add me as node approver. Thanks!

@k8s-ci-robot k8s-ci-robot removed the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Feb 10, 2025
@kkoch986
Copy link
Author

I can make a pass at this one. Add me as node approver. Thanks!

thanks @mrunalp! added

also added the PRR yaml

the older nodes will receive the `tls` config but ignore it which would
cause probes to fail if TLS is required.

We may not be able to graduate this widely until all kubelet version
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can you add more detail here? What happens when a pod is created with the new field and deployed against

  1. Older k8s release without this feature.
  2. New API server with this feature enabled and older kubelet without this feature.
  3. Feature gate turned on in API server but not in the kubelet.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

sure i can try to update this tonight

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

until all kubelet version skew supports the new tls configuration.

Need to clarify what the Kubelet does if it receives a pod that has a probe with the TLS configuration, but the feature gate is turned off. If the Kubelet ignores the field when the feature gate is disabled, then it will "never" be within the version skew range.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

tried to reword this section a bit, let me know if that clears it up!

@tallclair @mrunalp

@thockin
Copy link
Member

thockin commented Feb 12, 2025

mrunalp approved these changes 26 minutes ago

/approve
/lgtm

Still needs PRR, and given the last-minute addition, this KEP is at risk of missing.

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Feb 12, 2025
status: provisional
creation-date: 2025-01-08
reviewers:
- aojea
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm

Thanks

@kkoch986
Copy link
Author

/assign @deads2k

@thockin
Copy link
Member

thockin commented Feb 14, 2025

Is this going for an exception? Or just aiming for next release?

@kkoch986
Copy link
Author

Is this going for an exception? Or just aiming for next release?

not sure if i'm the one who's able to answer that, but just wanted to confirm waiting on @deads2k is the last hurdle. more so that i'm not blocking anything at this point

@thockin
Copy link
Member

thockin commented Feb 20, 2025

I think the window for exceptions is closed or closing

@k8s-ci-robot k8s-ci-robot removed the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Feb 21, 2025
@k8s-ci-robot
Copy link
Contributor

New changes are detected. LGTM label has been removed.

@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: kkoch986, mrunalp, thockin
Once this PR has been reviewed and has the lgtm label, please ask for approval from deads2k. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. kind/kep Categorizes KEP tracking issues and PRs modifying the KEP directory ok-to-test Indicates a non-member PR verified by an org member that is safe to test. sig/node Categorizes an issue or PR as relevant to SIG Node. size/XL Denotes a PR that changes 500-999 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

9 participants