-
Notifications
You must be signed in to change notification settings - Fork 39k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Pod Presets still in alpha since v1.6, time to remove it? #93900
Comments
I see removal of perma-alpha APIs as a natural next step after the "prevent perma-beta" work to put end dates on beta APIs |
The PodPreset functionality is not used in Service Catalog, we have an issue to remove references to it in the svc-cat repo, see: kubernetes-retired/service-catalog#2637 In the separate issue, we will figure out how to implement the e2e functionality for injecting secrets into an application: kubernetes-retired/service-catalog#2638 IMO it's ok to remove it as right now there is no decision about how to use it in svc-cat and currently we do not have enough capacity to work on that. In Kyma project we build an abstraction on top of PodPreset but we also forked PodPreset to our org. /cc @jberkhahn |
Many of us have been waiting for this to become mature since along time. |
Me too @devlounge. Doing my usual check of has-this-thing-got-to-beta-so-I-can-finally-use-it only to find PodPresets had entirely disappeared 😞 This feature was going to greatly simplify our manifests. We do have the mutating webhooks feature now, which we didn't when PodPresets were created. However PodPresets are a lot cleaner would have received a lot of use. Even Things in alpha can never gain traction or significant interest because managed providers won't let you enable them. This is not really a case of 'perma-beta'. But, if they were not going anywhere then I can understand removing them. |
Speaking of gaining traction and momentum, the 'Avoiding permanent beta' policy only has a nine-month countdown for beta features. This new policy clashes with the recent popularity of managed releases, which tend to lag upstream releases by 6-9 months (2-3 releases). E.g. the current AWS EKS lag for k8s release calendar is 6-9 months. That is before users can start planning upgrades in the 3-6 months after that. So a brand-spanking new beta feature won't reach cloud provider users until 9-15 months after it reaches beta upstream. Then users will start trying it out, and if it works well and get some interest and momentum behind it, only to find it has been already removed from a subsequent releases because of the mandatory 9-month policy 😄 In practice AWS probably won't enable a beta feature that is already removed upstream, so we can basically expect beta features will never reach, or get a chance for real-world feedback from cloud provider users. It is going to be tough for contributors to get 'evidence in real-world use' when the real world can't test a release with a beta feature until after it has already hit mandatory removal 🤔
|
For long running alpha features I usually recommend announcing depreaction
and removing after one release, instead of right away.
For extending the beta policy please see:
#94694.
|
Please don't remove this feature! We only just discovered it this week and it was positioned to solve a real issue with common volume specs, in the same way mentioned by @devlounge |
Could you elaborate on why PodPresets were never promoted to beta and why you want to remove them now? It seems like a useful feature. |
This feature would have been very useful in several operating scenarios, such as setting proxy settings before a deployment. |
Can anyone comment on what alternatives are? Without this feature we'll have a lot of duplication. No one likes duplication. We can address the Environment variables via ConfigMap and the envFrom keyword, however I cannot see anything for volumes, imagePullSecret etc. |
It seems the alternative is just to use mutating webhooks. And there is even a port of PodPreset to a mutating web hook by redhat: |
-1000 |
It doesn't look much maintained and active, sadly |
Related: #48180 |
There was an effort at one point to promote it to Beta kubernetes/enhancements#348
This may have moved to Service Catalog repo https://github.com/kubernetes-sigs/service-catalog/search?q=podpreset&type=Commits
So question, do we remove it from kubernetes/kubernetes ?
The text was updated successfully, but these errors were encountered: