Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update to EndpointSlices v1 #32056

Closed
howardjohn opened this issue Apr 8, 2021 · 7 comments · Fixed by #35577
Closed

Update to EndpointSlices v1 #32056

howardjohn opened this issue Apr 8, 2021 · 7 comments · Fixed by #35577
Assignees
Labels
area/networking lifecycle/staleproof Indicates a PR or issue has been deemed to be immune from becoming stale and/or automatically closed
Milestone

Comments

@howardjohn
Copy link
Member

discovery.k8s.io/v1beta1 EndpointSlices are deprecated in favor of discovery.k8s.io/v1, and will no longer be served in Kubernetes v1.25.

Need to take care when we add it for backwards compat

@istio-policy-bot istio-policy-bot added the lifecycle/stale Indicates a PR or issue hasn't been manipulated by an Istio team member for a while label Jul 8, 2021
@howardjohn
Copy link
Member Author

howardjohn commented Jul 8, 2021 via email

@istio-policy-bot istio-policy-bot removed the lifecycle/stale Indicates a PR or issue hasn't been manipulated by an Istio team member for a while label Jul 8, 2021
@howardjohn howardjohn added this to the Backlog milestone Sep 23, 2021
@howardjohn howardjohn added this to Release Blocker in Prioritization Sep 23, 2021
@istio-policy-bot istio-policy-bot added the lifecycle/stale Indicates a PR or issue hasn't been manipulated by an Istio team member for a while label Oct 7, 2021
@howardjohn howardjohn added the lifecycle/staleproof Indicates a PR or issue has been deemed to be immune from becoming stale and/or automatically closed label Oct 7, 2021
@istio-policy-bot istio-policy-bot removed the lifecycle/stale Indicates a PR or issue hasn't been manipulated by an Istio team member for a while label Oct 7, 2021
@howardjohn
Copy link
Member Author

@stevenctl I think we may need to add support for v1 and v1beta1 concurrently like we did with Ingress. Otherwise we have a delicate timing problem that may not work out.

Or we just move to v1 and say ES support wasn't stable yet - if we do that I think we need to do this before we start using it by default.

@stevenctl
Copy link
Contributor

To support both, we either need to:

  1. maintain duplicate code; we could possibly avoid this with codegen but that's not ideal either
  2. add some wrappers around EndpointSlice, EndpointPort, Endpoint to allow sharing code which could have perf implications

I think 1 will almost certainly lead to bugs creeping in. I'll try 2 and see how it affects the benchmarks.

@howardjohn
Copy link
Member Author

howardjohn commented Oct 12, 2021 via email

@stevenctl
Copy link
Contributor

stevenctl commented Oct 12, 2021

Well.. to measure this I'll need to add some kube bits to bench test.

I think I'll just fork for now and we can consolidate later.

The shared code ends up adding a lot of complexity too. Duplication is probably easier to grok.

@dgn
Copy link
Contributor

dgn commented Oct 19, 2021

shouldn't 1.12 be almost EOL by the time k8s 1.25 is released? is this really a blocker for 1.12?

@howardjohn howardjohn moved this from Release Blocker to P1 in Prioritization Oct 19, 2021
@howardjohn
Copy link
Member Author

@dgn I don't know why I put it as a release blocker, just dropped it. But it is good to get it in early, otherwise we end up with the 1.10 problem where users on a supported version (1.9) cannot upgrade to k8s 1.22

Prioritization automation moved this from P1 to Done Oct 19, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/networking lifecycle/staleproof Indicates a PR or issue has been deemed to be immune from becoming stale and/or automatically closed
Projects
Development

Successfully merging a pull request may close this issue.

4 participants