- Release Signoff Checklist
- Summary
- Motivation
- Proposal
- Design Details
- Production Readiness Review Questionnaire
- Implementation History
- Drawbacks
- Alternatives
Items marked with (R) are required prior to targeting to a milestone / release.
- (R) Enhancement issue in release milestone, which links to KEP dir in kubernetes/enhancements (not the initial KEP PR)
- (R) KEP approvers have approved the KEP status as
implementable
- (R) Design details are appropriately documented
- (R) Test plan is in place, giving consideration to SIG Architecture and SIG Testing input (including test refactors)
- e2e Tests for all Beta API Operations (endpoints)
- (R) Ensure GA e2e tests meet requirements for Conformance Tests
- (R) Minimum Two Week Window for GA e2e tests to prove flake free
- (R) Graduation criteria is in place
- (R) all GA Endpoints must be hit by Conformance Tests
- (R) Production readiness review completed
- (R) Production readiness review approved
- "Implementation History" section is up-to-date for milestone
- User-facing documentation has been created in kubernetes/website, for publication to kubernetes.io
- Supporting documentation—e.g., additional design documents, links to mailing list discussions/SIG meetings, relevant PRs/issues, release notes
Deprecate the status.nodeInfo.kubeProxyVersion
field of v1.Node
This field is not accurate, the field is set by kubelet, which does not actually know the kube-proxy version, or even if kube-proxy is running.
- Mark
status.nodeInfo.kubeProxyVersion
deprecated. - Find any places use it and get them to stop.
- Make kubelet stop setting the field.
-
Having kube-proxy itself set
status.nodeInfo.kubeProxyVersion
. Components should not be trying to figure out what Service features are available based on the kube-proxy version anyway, since some clusters may run an alternative service proxy implementation. If there is a need for a Service proxy feature discovery feature in the future, then that would need to be designed at that time. -
Changing
v1.Node
validation to require that the field be unset.
The proposal is to deprecate the kubeProxyVersion
field of NodeStatus
, and to have
kubelet set it to an empty string, rather than the kubelet version, in the future.
This field was used by the GCP cloud provider up until 1.28 for the legacy built-in cloud provider (kubernetes #117806, and up until 1.29 for the external cloud-provider (cloud-provider-gcp #533). It may also be used by other components. Thus, we will use a feature gate to protect it until all components are fixed.
Mark the kubeProxyVersion field as Deprecated.
// Deprecated: KubeProxy Version reported by the node.
KubeProxyVersion string `json:"kubeProxyVersion" protobuf:"bytes,8,opt,name=kubeProxyVersion"`
Mark the kubeProxyVersion field as Deprecated.
// Deprecated: KubeProxy Version reported by the node.
KubeProxyVersion string
[x ] I/we understand the owners of the involved components may require updates to existing tests to make this code solid enough prior to committing the changes necessary to implement this enhancement.
- Add a test to
TestVersionInfo
inpkg/kubelet/nodestatus
to see if FeatureGate behaves as expected when it is turned on or off. - If DisableNodeKubeProxyVersion FeatureGate is enabled:
status.nodeInfo.kubeProxyVersion
will remain unset if it is initially unset.status.nodeInfo.kubeProxyVersion
will be cleared if it is set.
- Else:
status.nodeInfo.kubeProxyVersion
will be set to the same value asstatus.nodeInfo.kubeletVersion
- N/A
- N/A
- Created the feature gate, disabled by default.
- Started looking for components that might be using the deprecated field.
- Make sure it works fine on supported versions of version skew.
- No issues reported.
- The announcement of deprecation will be made no less than one year in advance.
N/A
- Feature gate (also fill in values in
kep.yaml
)- Feature gate name: DisableNodeKubeProxyVersion
- Components depending on the feature gate: kubelet
Yes, it makes kubelet stop setting node.status.nodeInfo.kubeProxyVersion
.
Yes. Using the featuregate is the only way to enable/disable this feature.
The feature should continue to work just fine.
I manually confirmed that restarting kubelet behaves as expected with feature gate enabled/disabled.
I've tried to simulate this manually by running (using `local-cluster-up.sh).
Cluster Version v1.31+, FEATURE_GATES=DisableNodeKubeProxyVersion=false
(default value):
~ kubectl get nodes 127.0.0.1 -oyaml
apiVersion: v1
kind: Node
...
name: 127.0.0.1
uid: e74238e1-9e3c-41c5-a4ca-3a30941cd16c
...
kubeProxyVersion: v0.0.0-master+$Format:%H$
...
- Change the value of
DisableNodeKubeProxyVersion
to true and restart kubelet, The value of thekubeProxyVersion
field in nodeInfo is empty.
~ sudo sed -i s@DisableNodeKubeProxyVersion:\ false@DisableNodeKubeProxyVersion:\ true@g /tmp/local-up-cluster.sh.VABqgo/kubelet.yaml
➜ kubernetes git:(master) ✗ sudo -E /home/bing/go/src/k8s.io/kubernetes/kubernetes/_output/local/bin/linux/arm64/kubelet \
--v=3 --vmodule= --hostname-override=127.0.0.1 --cloud-provider= \
--cloud-config= --bootstrap-kubeconfig=/var/run/kubernetes/kubelet.kubeconfig \
--kubeconfig=/var/run/kubernetes/kubelet-rotated.kubeconfig \
--config=/tmp/local-up-cluster.sh.VABqgo/kubelet.yaml
➜ ~ kubectl get nodes 127.0.0.1 -oyaml
apiVersion: v1
kind: Node
...
name: 127.0.0.1
uid: e74238e1-9e3c-41c5-a4ca-3a30941cd16c
...
kubeProxyVersion: ""
...
- Change the value of
DisableNodeKubeProxyVersion
to false and restart kubelet, The value of thekubeProxyVersion
field in nodeInfo is not empty.
~ sudo sed -i s@DisableNodeKubeProxyVersion:\ true@DisableNodeKubeProxyVersion:\ false@g /tmp/local-up-cluster.sh.VABqgo/kubelet.yaml
➜ kubernetes git:(master) ✗ sudo -E /home/bing/go/src/k8s.io/kubernetes/kubernetes/_output/local/bin/linux/arm64/kubelet \
--v=3 --vmodule= --hostname-override=127.0.0.1 --cloud-provider= \
--cloud-config= --bootstrap-kubeconfig=/var/run/kubernetes/kubelet.kubeconfig \
--kubeconfig=/var/run/kubernetes/kubelet-rotated.kubeconfig \
--config=/tmp/local-up-cluster.sh.VABqgo/kubelet.yaml
~ kubectl get nodes 127.0.0.1 -oyaml
apiVersion: v1
kind: Node
...
name: 127.0.0.1
uid: e74238e1-9e3c-41c5-a4ca-3a30941cd16c
...
kubeProxyVersion: v0.0.0-master+$Format:%H$
...
If there is a component that we didn't know about using kubeProxyVersion, then it may fail in some unknown way when the administrator upgrades to a version with that field disabled. It should be possible to just roll back in this case.
N/A
I've tried to simulate this manually by running (using local-cluster-up.sh
with PRESERVE_ETCD=true
):
-
Cluster Version v1.30
FEATURE_GATES=DisableNodeKubeProxyVersion=false
(default value)git checkout release-1.30 Switched to branch 'release-1.30' Your branch is up to date with 'upstream/release-1.30'. ➜ kubernetes git:(release-1.30) ➜ kubernetes git:(release-1.30) sudo -E env PATH=$PATH PRESERVE_ETCD=true \ ETCD_DIR=/tmp/etcd-temp ./hack/local-up-cluster.sh
~ kubectl get nodes 127.0.0.1 -oyaml apiVersion: v1 kind: Node ... name: 127.0.0.1 uid: e74238e1-9e3c-41c5-a4ca-3a30941cd16c ... kubeProxyVersion: v0.0.0-master+$Format:%H$ ...
- The value of the
kubeProxyVersion
field in nodeInfo is not empty.
- The value of the
-
Cluster Version v1.31+
FEATURE_GATES=DisableNodeKubeProxyVersion=true
(manual setting)git checkout master Switched to branch 'master' ➜ kubernetes git:(master) sudo -E env PATH=$PATH PRESERVE_ETCD=true \ ETCD_DIR=/tmp/etcd-temp ./hack/local-up-cluster.sh
➜ ~ kubectl get nodes 127.0.0.1 -oyaml apiVersion: v1 kind: Node ... name: 127.0.0.1 uid: e74238e1-9e3c-41c5-a4ca-3a30941cd16c ... kubeProxyVersion: "" ...
- The value of the
kubeProxyVersion
field in nodeInfo is empty.
- The value of the
-
Cluster Version v1.30
FEATURE_GATES=DisableNodeKubeProxyVersion=true
(manual setting)git checkout release-1.30 Already on 'release-1.30' Your branch is up to date with 'upstream/release-1.30'. ➜ kubernetes git:(release-1.30) ➜ kubernetes git:(release-1.30) sudo -E env PATH=$PATH PRESERVE_ETCD=true \ ETCD_DIR=/tmp/etcd-temp FEATURE_GATES=DisableNodeKubeProxyVersion=true ./hack/local-up-cluster.sh
➜ ~ kubectl get nodes 127.0.0.1 -oyaml apiVersion: v1 kind: Node ... name: 127.0.0.1 uid: e74238e1-9e3c-41c5-a4ca-3a30941cd16c ... kubeProxyVersion: "" ...
- The value of the
kubeProxyVersion
field in nodeInfo is empty.
- The value of the
-
Cluster Version v1.31+
FEATURE_GATES=DisableNodeKubeProxyVersion=false
(default value)git checkout master Switched to branch 'master' ➜ kubernetes git:(master) ✗ sudo -E env PATH=$PATH PRESERVE_ETCD=true \ ETCD_DIR=/tmp/etcd-temp FEATURE_GATES=DisableNodeKubeProxyVersion=false ./hack/local-up-cluster.sh
~ kubectl get nodes 127.0.0.1 -oyaml apiVersion: v1 kind: Node ... name: 127.0.0.1 uid: e74238e1-9e3c-41c5-a4ca-3a30941cd16c ... kubeProxyVersion: v0.0.0-master+$Format:%H$ ...
- The value of the
kubeProxyVersion
field in nodeInfo is not empty.
- The value of the
Is the rollout accompanied by any deprecations and/or removals of features, APIs, fields of API types, flags, etc.?
- We will deprecate the
kubeProxyVersion
field inv1.Node
.
- N/A
No
No
No
No
Will enabling / using this feature result in increasing time taken by any operations covered by existing SLIs/SLOs?
No
Will enabling / using this feature result in non-negligible increase of resource usage (CPU, RAM, disk, IO, ...) in any components?
No
Can enabling / using this feature result in resource exhaustion of some node resources (PIDs, sockets, inodes, etc.)?
No
There will be no impact, because when the API server and etcd are not available, we will not be able to get the Node object.
N/A.
N/A.
- 2023-05-15: Initial draft KEP
- 2024-06-10: Promoted to beta and add manual upgrade and rollback tests
- 2024-08-25: Replace with Deprecated feature gates.
- 2025-01-23: promote feature to the disabled stage.