Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Use CNI v0.6.x in Kubernetes v1.9.0 #49480

Closed
luxas opened this issue Jul 24, 2017 · 70 comments · Fixed by #51250
Closed

Use CNI v0.6.x in Kubernetes v1.9.0 #49480

luxas opened this issue Jul 24, 2017 · 70 comments · Fixed by #51250
Assignees
Labels
area/ipv6 kind/feature Categorizes issue or PR as related to a new feature. priority/critical-urgent Highest priority. Must be actively worked on as someone's top priority right now. sig/cluster-lifecycle Categorizes an issue or PR as relevant to SIG Cluster Lifecycle. sig/network Categorizes an issue or PR as relevant to SIG Network. sig/node Categorizes an issue or PR as relevant to SIG Node.
Milestone

Comments

@luxas
Copy link
Member

luxas commented Jul 24, 2017

Is this a BUG REPORT or FEATURE REQUEST?:

/kind feature

It's time to decide which CNI version to use for v1.8.
We should do early in the cycle to catch regressions in the CNI <-> k8s integration.
We don't want the thing that happened in v1.6 to occur again, so we need to be very careful.

Currently, we're using v0.5.1 and consuming tarballs via a sha pushed by this Makefile: https://github.com/kubernetes/kubernetes/blob/master/build/cni/Makefile

We did this earlier because CNI didn't provide binary artifacts for all platform that kubernetes supports.
Since v0.5.2, they do, so we can get rid of build/cni/Makefile 🎉

Also, we don't want to consume a strange SHA as the version indicator, instead we want to use a version number and possibly a SHA for verification.

I guess it would make sense to bump CNI to v0.5.2 for the v1.8 cycle.
Agree/disagree? It's not clear to me when v0.6.0 will be released, but the rc has been out for some time already...

cc @kubernetes/sig-network-feature-requests @ixdy @freehan @kubernetes/sig-cluster-lifecycle-feature-requests @dcbw

@k8s-ci-robot k8s-ci-robot added kind/feature Categorizes issue or PR as related to a new feature. sig/network Categorizes an issue or PR as relevant to SIG Network. sig/cluster-lifecycle Categorizes an issue or PR as relevant to SIG Cluster Lifecycle. labels Jul 24, 2017
@luxas luxas added this to the v1.8 milestone Jul 24, 2017
@luxas
Copy link
Member Author

luxas commented Jul 24, 2017

cc @bboreham

@bboreham
Copy link
Contributor

CNI v0.6 should be out this week

There are a bunch of small fixes; also this is the first version that includes the portmap plugin.

@luxas
Copy link
Member Author

luxas commented Jul 24, 2017

@bboreham So you're advocating for using v0.6?
Well, that's fine by me.

I just want to be sure we track all the action items correctly and make sure we test everything properly in time.

What we (at least) need to do:

  • Bump the CNI vendored libraries
  • Remove build/cni
  • Update all binary download references to v0.5.1 to v0.6.0
  • Update debs/rpm packages to use v0.6.0
  • Make sure all CNI network providers are compatible with the CNI v0.3.1 spec
  • Make sure CRI properly integrates with CNI v0.6.0
  • Resolve Create pod latency increase #54651

More action items?

@dixudx
Copy link
Member

dixudx commented Jul 24, 2017

/cc

@timothysc
Copy link
Member

Is there a changelog we should be following?
I'd like to properly build the rpms now as well.

@bboreham
Copy link
Contributor

No changelog file but releases are visible in https://github.com/containernetworking/cni/releases and https://github.com/containernetworking/plugins/releases and announced on the CNI mailing list and Kubernetes sig-network mailing list.

@luxas
Copy link
Member Author

luxas commented Aug 19, 2017

CNI v0.6.0 is out https://github.com/containernetworking/cni/releases/tag/v0.6.0 🎉, but it's too late in the cycle for us to update.
I think we should target k8s to use v0.6.x in v1.9 (and then include portmap, etc. etc.)

@dixudx is this something you'd want to work on?

@luxas luxas changed the title Decide what CNI version to use in v1.8. Possibly v0.5.2? Use CNI v0.6.x in Kubernetes v1.9.0 Aug 19, 2017
@luxas luxas modified the milestones: v1.9, v1.8 Aug 19, 2017
@dixudx
Copy link
Member

dixudx commented Aug 23, 2017

@luxas I would like to work on this. Thanks. Will send out a PR later.

@roberthbailey
Copy link
Contributor

Shouldn't we ask @kubernetes/sig-network-misc which CNI version we should be supporting with 1.8? And try to make the CNI version consistent across all of the install tools?

@dixudx
Copy link
Member

dixudx commented Aug 24, 2017

Shouldn't we ask @kubernetes/sig-network-misc which CNI version we should be supporting with 1.8? And try to make the CNI version consistent across all of the install tools?

@roberthbailey +1. Waiting for the reply.

@k8s-ci-robot
Copy link
Contributor

@dixudx: Reiterating the mentions to trigger a notification:
@kubernetes/sig-network-misc.

In response to this:

Shouldn't we ask @kubernetes/sig-network-misc which CNI version we should be supporting with 1.8? And try to make the CNI version consistent across all of the install tools?

@roberthbailey +1. Waiting for the reply.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@luxas
Copy link
Member Author

luxas commented Aug 24, 2017

@roberthbailey I'm not dictating, here I'm asking what version is targeted 😄.
Seems like folks are happy with this; no objections so far.
Think it's definitely too late to upgrade CNI at this point, so upgrading as @bboreham mentioned makes sense to me in v1.9

@feiskyer
Copy link
Member

Think it's definitely too late to upgrade CNI at this point, so upgrading as @bboreham mentioned makes sense to me in v1.9

Agreed, time too late now. v1.9 is preferred.

@danehans
Copy link

/area ipv6

@danehans
Copy link

@feiskyer I am part of a team adding IPv6 support to k8s. CNI 0.6.0 is needed for assigning IPv6 addresses to pods. Several users are interested in k8s IPv6 support. It would be very helpful to get the cni bump into 1.8. However, I respect your decision if you choose to wait until 1.9.

@feiskyer
Copy link
Member

@danehans Is IPv6 feature a blocker of 1.8?

/cc @kubernetes/sig-network-misc

@danehans
Copy link

@feiskyer I'm a relatively new contributor. Can you help me understand or point me to documentation that explains what qualifies a feature as a blocker for a release? IPv6 is a feature several users are waiting for us to release.

@danehans
Copy link

/assign @thockin

@caseydavenport
Copy link
Member

but I would like to hold this open until we know how it's going to work.

@enisoc Sounds fine to me - who is making that decision?

@chrislovecnm
Copy link
Contributor

@caseydavenport which decision?

@caseydavenport
Copy link
Member

In particular, we need a plan to make sure k8s 1.9 uses CNI 0.6.0, while keeping k8s 1.8 and below on CNI 0.5.x.

@chrislovecnm this one ^

@danehans
Copy link

danehans commented Dec 7, 2017

@luxas @caseydavenport now that a 1.9 branch has been cut, can CNI get bumped?

@dixudx
Copy link
Member

dixudx commented Dec 8, 2017

now that a 1.9 branch has been cut, can CNI get bumped?

@danehans Already bumped in #51250 (merged). Only get kubernetes/release#446 left, should be shipped ASAP, since v1.9 is coming out.

@danehans
Copy link

danehans commented Dec 8, 2017

@dixudx I have added IPv6 support details to the 1.9 release notes.

@danehans
Copy link

@dixudx what needs to be done to close this issue? The 1.9 burndown kubernetes/sig-release#38 (comment) is highlighting this issue:

CNI 0.6.0: (#49480): issue still lacks
an "owner" who is going to make sure that the deploy & packaging changes happen. There have been
some updates on this, but a critical outstanding issue is making sure that people can still install version 1.8 with the correct CNI.

@k8s-github-robot
Copy link

[MILESTONENOTIFIER] Milestone Issue Current

@luxas @thockin

Note: This issue is marked as priority/critical-urgent, and must be updated every 1 day during code freeze.

Example update:

ACK.  In progress
ETA: DD/MM/YYYY
Risks: Complicated fix required
Issue Labels
  • sig/cluster-lifecycle sig/network sig/node: Issue will be escalated to these SIGs if needed.
  • priority/critical-urgent: Never automatically move issue out of a release milestone; continually escalate to contributor and SIG through all available channels.
  • kind/feature: New functionality.
Help

@dixudx
Copy link
Member

dixudx commented Dec 13, 2017

what needs to be done to close this issue?

@danehans Can be closed when kubernetes/release#486 get merged. PTAL.

@resouer
Copy link
Contributor

resouer commented Dec 14, 2017

I think all CRI runtimes has been upgraded, ref: kubernetes-retired/frakti#270

@danehans
Copy link

@dixudx kubernetes/release#486 has ben merged. Can we close this issue?

@caseydavenport
Copy link
Member

I think so - @enisoc do you agree?

@luxas
Copy link
Member Author

luxas commented Dec 14, 2017

Can we close this now with kubernetes/release#486 merged? I think so

@enisoc
Copy link
Member

enisoc commented Dec 14, 2017

@pipejakob is still working on back-filling packages for old k8s versions to prevent them from picking up kubernetes-cni 0.6.0. I think we can close this once that's done.

@enisoc
Copy link
Member

enisoc commented Dec 15, 2017

@pipejakob reported last night that the back-fill is done and staged in unstable. He's tested the updated packages, so we just need to re-tag that package set as stable this morning before pushing v1.9.0 in the afternoon.

@enisoc enisoc closed this as completed Dec 15, 2017
@pipejakob
Copy link
Contributor

Thanks for remembering to update here, @enisoc. All of the backfill builds are now promoted to stable (with easy rollback instructions in case anything goes wrong). Should be good to go today with the 1.9 debs/rpms after the release is cut.

@luxas
Copy link
Member Author

luxas commented Dec 18, 2017

Thanks @pipejakob for helping with this!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/ipv6 kind/feature Categorizes issue or PR as related to a new feature. priority/critical-urgent Highest priority. Must be actively worked on as someone's top priority right now. sig/cluster-lifecycle Categorizes an issue or PR as relevant to SIG Cluster Lifecycle. sig/network Categorizes an issue or PR as relevant to SIG Network. sig/node Categorizes an issue or PR as relevant to SIG Node.
Projects
None yet
Development

Successfully merging a pull request may close this issue.