-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Pod Overhead: account resources tied to the pod sandbox, but not specific containers #688
Comments
/help /cc @egernst |
Thanks @tallclair. I may have questions on the process, but am happy to pick this up. |
\o/ |
@tallclair: GitHub didn't allow me to assign the following users: egernst. Note that only kubernetes members and repo collaborators can be assigned and that issues/PRs can only have 10 assignees at the same time. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/assign @egernst |
Hey @tallclair et al, I made several suggestions for the WIP RFC @ https://docs.google.com/document/d/1EJKT4gyl58-kzt2bnwkv08MIUZ6lkDpXcxkHqCvvAp4/edit?usp=sharing I added a section for updating the runtimeClass CRD, and explained how the values would be obtained from the new suggested runtimeClass fields rather than configured in the runtimeController. The suggested runtimeController scope is also greatly reduced, allowing this first iteration to just handle adding the pod overhead. PTAL. |
@tallclair @egernst I quickly went though the design proposal. We are working on In-Place Vertical Scaling for Pods, and I want to clarify a couple of things. In the context or in-place resize, do you see PodSpec.Overhead as something VPA should be aware of via metrics reporting? And perhaps in the future, track this field and make recommendations for it. It would be a good idea to nail down early-on if this field should be mutable by an external entity. |
Hello @tallclair, I'm the Enhancement Lead for 1.15. It looks like there is no KEP accepted yet. Is it safe to assume this will not make the enhancement freeze deadline for 1.15? |
Updates to pod-overhead based in review discussion: - Clarify what Overhead is in the pod spec, and behavior when this is manually defined without a runtimeClass. - Clarify ResourceQuota changes necessary - Add in CRI API change to make pod details available - Define feature gate - Update runtimeClass definition Fixes: kubernetes#688 Signed-off-by: Eric Ernst <[email protected]>
We're still planning on getting this into 1.15. Don't we still have close to 3 weeks to get the KEP in? KEP is here, btw: https://github.com/kubernetes/enhancements/blob/master/keps/sig-node/20190226-pod-overhead.md |
Updates to pod-overhead based in review discussion: - Clarify what Overhead is in the pod spec, and behavior when this is manually defined without a runtimeClass. - Clarify ResourceQuota changes necessary - Add in CRI API change to make pod details available - Define feature gate - Update runtimeClass definition Fixes: kubernetes#688 Signed-off-by: Eric Ernst <[email protected]>
Updates to pod-overhead based in review discussion: - Clarify what Overhead is in the pod spec, and behavior when this is manually defined without a runtimeClass. - Clarify ResourceQuota changes necessary - Add in CRI API change to make pod details available - Define feature gate - Update runtimeClass definition Fixes: kubernetes#688 Signed-off-by: Eric Ernst <[email protected]>
Updates to pod-overhead based in review discussion: - Clarify what Overhead is in the pod spec, and behavior when this is manually defined without a runtimeClass. - Clarify ResourceQuota changes necessary - Add in CRI API change to make pod details available - Define feature gate - Update runtimeClass definition Fixes: kubernetes#688 Signed-off-by: Eric Ernst <[email protected]>
Updates to pod-overhead based in review discussion: - Clarify what Overhead is in the pod spec, and behavior when this is manually defined without a runtimeClass. - Clarify ResourceQuota changes necessary - Add in CRI API change to make pod details available - Define feature gate - Update runtimeClass definition Fixes: kubernetes#688 Signed-off-by: Eric Ernst <[email protected]>
All good for 1.24 Enhancements Freeze |
Hi @egernst 👋 1.24 Docs lead here. This enhancement is marked as Needs Docs for the 1.24 release. Please follow the steps detailed in the documentation to open a PR against the Also, if needed take a look at Documenting for a release to familiarize yourself with the docs requirement for the release. Thanks! |
Hi @egernst 1.24 Enhancements Team here, The status of this enhancement is at risk until the PRs are merged. Please let me know if I'm missing any. Thanks! |
Hi @SergeyKanzhelev @egernst 👋 1.24 Release Comms team here. We have an opt-in process for the feature blog delivery. If you would like to publish a feature blog for this issue in this cycle, then please opt in on this tracking sheet. The deadline for submissions and the feature blog freeze is scheduled for 01:00 UTC Wednesday 23rd March 2022 / 18:00 PDT Tuesday 22nd March 2022. Other important dates for delivery and review are listed here: https://github.com/kubernetes/sig-release/tree/master/releases/release-1.24#timeline. For reference, here is the blog for 1.23. Please feel free to reach out any time to me or on the #release-comms channel with questions or comments. Thanks! |
Hi @SergeyKanzhelev, is kubernetes/kubernetes#108781 code for this feature as well? |
All good for 1.24 Code Freeze 🥳 |
@SergeyKanzhelev Would you like to add this to the feature blog? I can add it on your behalf if you still do not have the permissions. If you would like to add this to the feature blog, then please add a placeholder PR as well by March 30. Example of a feature blog PR: kubernetes/website#30538 |
Hello @SergeyKanzhelev @egernst 👋, 1.25 Enhancements team here. This feature has been fully implemented and is now GA in K8s version 1.24. 🎉 Please update the kep.yaml file's status to This would help accurate tracking in the v1.25 cycle. Thank you so much! 🙂 |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/lifecycle frozen @SergeyKanzhelev @egernst Can we close this? |
Yes, I think it can. Just two house cleaning items left, pls review if you have time:
(not sure for the process of updating website - like removing the feature gate mention here https://kubernetes.io/docs/concepts/scheduling-eviction/pod-overhead/). But I think it should stay there for longer /close |
@SergeyKanzhelev: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Enhancement Description
Account resources consumed by the pod sandbox, both for scheduling and limiting runtime usage.
@egernst
/sig node
WIP: https://docs.google.com/document/d/1EJKT4gyl58-kzt2bnwkv08MIUZ6lkDpXcxkHqCvvAp4/edit?usp=sharing
Relevant K/K issues/PRs for code-freeze::
e2e tests: kubernetes/kubernetes#87215
monitoring: kubernetes/kubernetes#87259
Relevant K/E issues: #1526
Please to keep this description up to date. This will help the Enhancement Team track efficiently the evolution of the enhancement
The text was updated successfully, but these errors were encountered: