-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Dynamic Maximum volume count #554
Comments
/assign |
Is it intended for this to work with flexvolume plugins? We still lack a solution for that use-case. |
It is intended to work with all volume types. Including Flexvolume and CSI. |
@kubernetes/sig-storage-feature-requests |
/assign @gnufied |
@gnufied please fill out the appropriate line item of the |
@gnufied -- What's the current status of this feature? Please update the line item for this feature on the |
The PR is still on track for 1.11. The implementation PR is here - kubernetes/kubernetes#64154 We have approval from @saad-ali . We are waiting on approvals from @liggitt and @bsalamat . I just had to rebase the PR because the upstream changed and jordan requested some naming changes. |
@gnufied -- there needs to be a Docs PR issued as well, as Misty mentioned above. |
Added docs PR - kubernetes/website#8871 |
@gnufied thanks for the update! I've moved this feature back into the main sheet. |
Automatic merge from submit-queue (batch tested with PRs 66410, 66398, 66061, 66397, 65558). If you want to cherry-pick this change to another branch, please follow the instructions <a href="https://github.com/kubernetes/community/blob/master/contributors/devel/cherry-picks.md">here</a>. Fix volume limit for EBS on m5 and c5 instances This is a fix for lower volume limits on m5 and c5 instance types while we wait for kubernetes/enhancements#554 to land GA. This problem became urgent because many of our users are trying to migrate to those instance types in light of spectre/meltdown vulnerability but lower volume limit on those instance types often causes cluster instability. Yes they can workaround by configuring the scheduler with lower limit but often this becomes somewhat difficult to do when cluster is mixed. The newer default limits were picked from https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/volume_limits.html Text about spectre/meltdown is available on - https://community.bitnami.com/t/spectre-variant-2/54961/5 /sig storage /sig scheduling ```release-note Fix volume limit for EBS on m5 and c5 instance types ```
@gnufied This feature was worked on in the previous milestone, so we'd like to check in and see if there are any plans for this to graduate stages in Kubernetes 1.12 as mentioned in your original post. This still has the alpha tag as well so we need to update it accordingly. If there are any updates, please explicitly ping @justaugustus, @kacole2, @robertsandoval, @rajendar38 to note that it is ready to be included in the Features Tracking Spreadsheet for Kubernetes 1.12. Please note that the Features Freeze is July 31st, after which any incomplete Feature issues will require an Exception request to be accepted into the milestone.In addition, please be aware of the following relevant deadlines:
Please make sure all PRs for features have relevant release notes included as well. Happy shipping! |
@kacole2 For 1.12 the plan is to further expand this feature to cover more volume types. Add CSI support. The decision to whether to move to beta in 1.12 or not will be taken in a day or two. |
Hello @gnufied -- 1.17 Enhancement Shadow here! 🙂 I wanted to reach out to see if this enhancement will be graduating to stable in 1.17?
Thank you! 🔔Friendly Reminder The current release schedule is
|
/assign |
Hi @kcmartin; we intend to graduate this feature to GA in v1.17. |
Thanks @bertinatto ! |
/stage stable |
Hello @gnufied I'm one of the v1.17 docs shadows. If so, just a friendly reminder we're looking for a PR against k/website (branch dev-1.17) due by Friday, November 8th, it can just be a placeholder PR at this time. Let me know if you have any questions! |
Since we're approaching Docs placeholder PR deadline on Nov 8th. Please try to get one in against k/website dev-1.17 branch. |
@irvifa: created placeholder PR here: kubernetes/website#17432 |
Hi @gnufied Are there any other PRs related to this enhancement? If yes, can you please link them here? Thank you in advance 😄 |
Hi @kcmartin. |
Thank you @bertinatto ! |
Hey @gnufied @bertinatto , Happy New Year! 1.18 Enhancements lead here 👋 Thanks for getting this across the line in 1.17!! I'm going though and doing some cleanup for the milestone and checking on things that graduated in the last release. Since this graduated to GA in 1.17, I'd like to close this issue out but the KEP is still marked as implementable. Could you submit a PR to update the KEP to Thanks so much! |
Hi @jeremyrickard, I just created #1433 to update the KEP status. |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
/remove-lifecycle stale |
Hi @bertinatto, thank you so much for updating the status. :) |
Closing this enhancement issue since the KEP has been implemented. /close |
@palnabarun: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Feature Description
The text was updated successfully, but these errors were encountered: