-
Notifications
You must be signed in to change notification settings - Fork 392
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[1.9] Issue Burndown #38
Comments
Summary for Nov. 27 A slew of issues has been opened around failing tests, including: New Test Failures (mostly e2e tests): Old Test Failures in Progress: Old Test Failures Not Getting Attention: New Bugs: Old Bugs in Progress: Old Bugs Not Getting Attention: Non-release-blocker: Special Cases: #54551: Advanced Auditing (kubernetes/kubernetes#54551) really appears to be Not Ready for 1.9, depending on a bunch of PRs which either don't exist or aren't close to approval. Some of those PRs might be separable from a 1.9 feature, but I'm not clear on which those are. I've escalated to the feature/issue owner and sig/instrumentation. This includes some related issues: #55978: this issue looks like it should be closed, given the code merges. However, I haven't been able to get sig/node or JingXu to confirm that. #49480: CNI 0.6.0 this issue appears to have a huge chicken-egg problem with dependencies. It's making progress, but slowly. Escalated to sig/network |
Today's status: Summary for Nov. 28 20 total issues, so making progress All "not getting attention" issues have been raised with the respective SIGs on Slack. New Test Failures (<1 day old) Test Failures in Progress: Test Failures Not Getting Attention: New Bugs (<1 day old): Bugs in Progress: Bugs Not Getting Attention: Special Cases: #54551: Advanced Auditing (kubernetes/kubernetes#54551) Exception raised on burndown list. This includes some related issues: #55978: has been closed. #49480: CNI 0.6.0 Now waiting on figuring out packaging/deployment. Receiving attention. #56504: kubeadm tracker. I have not get gone through the kubeadm issues for status. More later. |
So, based on today's meeting, let me give a breakdown of which issues appear to be blockers to me. Please note that, for many of the ones not receiving enough attention, I also don't have feedback from the SIG on how critical they are, so I'm guessing based on the description & reports back. Issues that I don't mention below are non-concerning. Bugs & Test FailuresRed Tests/BugsUpgrade & Downgrade: Several failures, mostly on GKE. Downgrade appears generally broken.
Horizontal Pod Autoscaling may be failing, or the test may be broken, we can't tell #54574 Yellow:Misc Bugs and Performance issues with proposed fixes:
Tests that need test fixes:
Performance Test issues, not possible to tell if these are actual performance issues
FeaturesBlockingKubeadm just added a whole list of milestone items (#56504). However, it is opaque to me which of those is actually a blocker, and which is in progress. CNI 0.6.0 (#49480): the code has been changed, but how this works for deployments and packaging has not been resolved. Non-BlockingAWS NVME Support: #56155, in progress, but if we don't have it, it's not a feature that worked before. See Exception request. Advanced Audit Logging: includes #53020, #53006, #54551. This whole feature can be pushed to 1.10 if it's not ready on time. See Exception request. |
DocsFriday, December 1 is the deadline for all docs PRs to be reviewable. According to the feature tracking spreadsheet, these issues still need to open a docs PR (due 11/22): kubernetes/enhancements#365 /cc @enisoc @idvoretskyi |
Status update for Friday, Dec 1: Status of PRs and Bugs I'm adding PRs to this burndown, because I'm concerned about PRs which haven't yet been merged. The good news is that we're down to 17 issues and 10 PRs. The bad news is that two of those 18 issues are tracking issues. This status is updated before the extensions are due. Redbugs/failures which appear user-visible and for which no approved PR exists Issues:
PRs:
Yellowbugs/failures which either appear minor, or for which a PR in good shape exists Issues:
PRs:
Greenissues which appear resolved but are not yet closed/removed. Issues:
Exception Status & Special CasesAdvanced Auditing: due today. CNI 0.6.0: (#49480): see above. Also there seems to be no leadership on figuring this out. AWS NVME Support: due today Update Dashboard: due today, appears to be waiting only on owner approval. Autoprobing Network-ID: due today, appears to just be waiting on owner approval. |
Status of PRs and Bugs Down to 10 issues, and 14 PRs. Many of those PRs are random changes which happen Remaining critical issues appear to be the Azure breakage, failure to test downgrade, Redbugs/failures which appear user-visible and for which no approved PR exists Issues:
PRs:
Yellowbugs/failures which either appear minor, or for which a PR in good shape exists Issues:
PRs:
Greenissues which appear resolved but are not yet closed/removed. PRs:
Exception Status & Special CasesAdvanced Auditing: due 12/1
CNI 0.6.0: (kubernetes/kubernetes#49480): issue still lacks Kubeadm Changes (kubernetes/kubernetes#56504): according to SIG, AWS NVME Support: Completed Update Dashboard: Completed Autoprobing Network-ID: Completes |
Status of PRs and Bugs Currently 13 issues (including new bugs). There are 16 PRs, but quite a number Remaining critical issues appear to be failure to test downgrade, Redbugs/failures which appear user-visible and for which no approved PR exists Issues:
PRs:
Yellowbugs/failures which either appear minor, or for which a PR in good shape exists Issues:
PRs:
Greenissues which appear resolved but are not yet closed/removed. Issues:
PRs:
Exception Status & Special CasesAdvanced Auditing: due 12/1 CNI 0.6.0: (kubernetes/kubernetes#49480): issue still lacks Kubeadm Changes (kubernetes/kubernetes#56504): according to SIG, AWS NVME Support: Completed Update Dashboard: Completed Autoprobing Network-ID: Completed |
Status of PRs and Bugs Currently 10 issues (including new bugs). There are 11 PRs. I've Remaining critical issues appear to be failure to test downgrade, (and thanks Zachary for showing that I could be using markdown tables for this!) Redbugs/failures which appear user-visible and for which no approved PR exists Issues:
PRs:
Yellowbugs/failures which either appear minor, or for which a PR in good shape exists Issues:
PRs:
Greenissues which appear resolved but are not yet closed/removed.
PRs:
Exception Status & Special CasesAdvanced Auditing: Complete CNI 0.6.0: (kubernetes/kubernetes#49480): issue still lacks Kubeadm Changes (kubernetes/kubernetes#56504): according to SIG, AWS NVME Support: Completed Update Dashboard: Completed Autoprobing Network-ID: Completed |
Status of PRs and Bugs Currently 9 issues (including new bugs). There are 15 PRs, including several partial fixes Remaining critical issues appear to be failure to test downgrade, (and thanks Zachary for showing that I could be using markdown tables for this!) Redbugs/failures which appear user-visible and for which no approved PR exists Issues:
PRs:
Yellowbugs/failures which either appear minor, or for which a PR in good shape exists Issues:
PRs:
Greenissues which appear resolved but are not yet closed/removed.
PRs:
Exception Status & Special CasesAdvanced Auditing: Complete CNI 0.6.0: (kubernetes/kubernetes#49480): issue still lacks Kubeadm Changes (kubernetes/kubernetes#56504): according to SIG, AWS NVME Support: Completed Update Dashboard: Completed Autoprobing Network-ID: Completed |
PR status Update This is the Sudden Death Overtime tracking of PRs Redcritical PRs fixing major breakage issues with 1.9. Appropriate SIGs have been queried for status today.
Yellow*PRs with status updates, which are non-blockers but have not been kicked out of 1.9 *
GreenPRs which appear non-critical, have been bumped by downgrading them to priority/important-soon
|
Ok, I should have created hard deadlines much earlier. We're down to two PRs now: Red
YellowNone Green
|
Status of PRs and Bugs Final burndown Remaining critical issues appear to be failure to test downgrade, Redbugs/failures which appear critical and for which no approved PR exists Issues:
PRs:
Yellowbugs/failures which either appear to be not showstoppers, or for which a PR in good shape exists Issues:
PRs:
Greennon-blocker issues
PRs:
Exception Status & Special CasesAdvanced Auditing: Complete CNI 0.6.0: (kubernetes/kubernetes#49480): issue still lacks Kubeadm Changes (kubernetes/kubernetes#56504): according to SIG, AWS NVME Support: Completed Update Dashboard: Completed Autoprobing Network-ID: Completed |
Status of PRs and Bugs Final Final Final burndown Yay downgrade is fixed, now it's really just CNI Giving up on usual format, because there's really just a handful of things to fix. Stackdriver issue: has two PRs, both approved
CNI 0.6.0
Scalability test flakiness
|
This is a tracker for status updates on 1.9 issue burndown.
The text was updated successfully, but these errors were encountered: