Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Call For Unconference Topics - Kubernetes Contributor Summit North America, Salt Lake City 2024 #7993

Open
nitishfy opened this issue Jul 25, 2024 · 22 comments
Assignees
Labels
area/contributor-summit Issues or PRs related to all Contributor Summit events area/na-summit Issues or PRs related to the Contributor Summit in North America sig/contributor-experience Categorizes an issue or PR as relevant to SIG Contributor Experience.

Comments

@nitishfy
Copy link
Member

nitishfy commented Jul 25, 2024

Hello friends!🌎

We're excited to host an Unconference at this year's Kubernetes Contributor Summit in Salt Lake City, Utah! Your input is crucial in making this event a success, so we'd love to hear from you about the topics you're passionate about. You can submit a topic and upvote the ones that catch your interest. Our goal is to capture what the community is most interested in, whether you're attending in person or participating remotely.

Topic: [Submit your topic here]
Description: [Provide a brief description]
Moderator: [Are you attending in person and willing to moderate? (yes or no)]

To upvote topics, please use the 👍 emote.

For any questions, feel free to reach out to me (nitish on Slack).

Thank you for your contributions!
Nitish Kumar, KCNA Contributor Summit 2024 Content Lead

SESSION NOTES CAN BE FOUND HERE: k8s.dev/summit/notes

@k8s-ci-robot k8s-ci-robot added the needs-sig Indicates an issue or PR lacks a `sig/foo` label and requires one. label Jul 25, 2024
@nitishfy
Copy link
Member Author

/sig contributor-experience
/area contributor-summit
/area na-summit

@k8s-ci-robot k8s-ci-robot added sig/contributor-experience Categorizes an issue or PR as relevant to SIG Contributor Experience. area/contributor-summit Issues or PRs related to all Contributor Summit events area/na-summit Issues or PRs related to the Contributor Summit in North America and removed needs-sig Indicates an issue or PR lacks a `sig/foo` label and requires one. labels Jul 25, 2024
@nitishfy
Copy link
Member Author

/assign

@aojea
Copy link
Member

aojea commented Aug 30, 2024

Topic: Untangling the Kubernetes E2E test

Description: The e2e tests framework is improving slowly, a new an important feature was added recently by @pohly that allows to organize better the tests #7824 and makes its consumption easier, avoiding regex and using labels. An attempt to better categorize the test was done
in kubernetes/enhancements#3042, but we need to achieve a wider consensus between SIGs and e2e consumers so we can standardize the categorization and organization of these tests.
There are multiple dimensions to debate:

  • Importance: Conformance, Required, Nice To Have, ...
  • Feature required as in Feature Gate and API foo enabled
  • Environment or Cluster feature required as OS Linux or NFS, ..
  • Specific component required, i.e. kube-proxy
    ...

Moderator: @aojea, @BenTheElder , @pohly

@ameukam
Copy link
Member

ameukam commented Sep 10, 2024

Topic: Issue and PR Triage with AI.
Description: This is inspired by the Golang effort to use LLMs to triage issues. We could have a conversation with the community on how we explore usage LLMs to help with issue triage and minimal code review.
Moderator: @ameukam (unsure at the moment)

@SergeyKanzhelev
Copy link
Member

Topic: Dynamic Pods and other improvements to enhance Kubernetes for Dynamic Batch Workloads
Description: Discuss the future of hierarchical scheduling and possible improvements on k8s to better support dynamic batch workloads
Moderator: @SergeyKanzhelev @dchen1107
See also: https://docs.google.com/document/d/1J8Aq0XzN8BiNdWHXSEGA1Xw2nXcZRSKTMoi-tNh7FTc/edit#heading=h.nz1pdsqflie7

@jberkus
Copy link
Contributor

jberkus commented Sep 17, 2024

Topic: WG-Etcd-Operator Working Session

Description: WG-Etcd-Operator would like to have an open working session at the KCS. We'll be working on the operator design, code, and testing. This will also be an opportunity to share the state of the operator design with the Kubernetes community.

Moderator: @jmhbnz, @jberkus

@kad
Copy link
Member

kad commented Sep 24, 2024

Topic: The future of native resources

Description: Modern hardware changed our view on the native resources (CPU, memory). We want to talk on what and how it can be potentially improved on all levels: possible UX in Pod spec, per pod/container granularity to specify preferences, CRI API, relation to DRA, dynamic node resize, roles of kubelet and container runtimes.

Moderator: @kad, @johnbelamaric

@guicassolato
Copy link

Topic: Metaresources & Policy Attachment

Description: Gateway API (SIG-NETWORK) introduced Policies as a declarative mechanism to enhance Kubernetes objects like Services and network extensions such as Gateways and HTTPRoutes. These Policies–more generally referred to as Metaresources–are the central piece of a pattern known as Policy Attachment, which is heading to new levels of maturity, evolving from initially an inventive way to expand solidified stable APIs, now into a new standard in the making across several networking-related implementations for contextual API extensions. This session will delve into the concept and evolution of Metaresources & Policy Attachment, exploring its goals, current state, and future potential.

Moderator: @guicassolato

@enj
Copy link
Member

enj commented Oct 2, 2024

Topic: wg-lts: proposal to increase release lifetime with regards to CVEs

Description: The security releases proposal attempts to take a slightly different approach to LTS than what is traditionally discussed. Instead of trying to mark any particular Kubernetes release as LTS, it proposes that we increase the supported lifetime of all Kubernetes releases, but with only security fixes being backported after the initial 14 months. Such a change has an impact on a broad set of community members, so lets take this opportunity to discuss things in person.

Moderator: @enj @jeremyrickard

@dougbtv
Copy link

dougbtv commented Oct 17, 2024

Topic: The lost WG: Network Plumbing Working Group

Description: The Kubernetes Network Plumbing Working Group (NPWG) was formed at Kubecon US in Austin in 2017, with a goal of finding a path forward for attaching Kubernetes pods to multiple networks: that is, for multi-homed pods. The group decided to work out-of-tree and form a de-facto standard for the NetworkAttachmentDefinition custom resource, and built tooling and reference implementation that interface Kubernetes and CNI to enable advanced networking use cases and for attaching pods to multiple networks (for such use cases as network isolation and performance).

The NPWG, operating under its own governance model, developed and maintains 39 GitHub repositories, ranging from wildly experimental to fully GA software – including Multus CNI (an implementation of NetworkAttachmentDefinitions), SRIOV-CNI, SRIOV device plugin, and Whereabouts IPAM CNI, among others.

We'll look into the history of NPWG, what the group is working on today, and the insights the group has into the future of networking in Kubernetes and across the CNCF, especially related to the future of CNI, the multinetworking WG and DRA.

We'd love to explore what it might look like to bring this group officially into the CNCF and to enable its contributors to officially serve and better collaborate with the community that it was formed around.

Moderators: Doug, @LionelJouin, @shaneutt

@jberkus
Copy link
Contributor

jberkus commented Oct 17, 2024

@dougbtv that feels like a discussion we'd need to have somewhere CNCF leadership is present. Like, it totally makes sense to me to make it a CNCF project -- or something? -- but I don't know what the TOC would want. And most TOC members will not be at the KCS.

@micahhausler
Copy link
Member

Topic: Consistency in api-machinery between authorization and admission

Description: To secure a cluster today, admins typically grant RBAC authorization permissions and also write separate admission policies in various formats (OPA/Gatekeeper, Kyverno, Validating webhooks containing CEL) to further restrict permissions granted in authorization. Because Kubernetes performs authorization and admission checks separately, for an administrator to safely revoke a permission, they must first revoke the RBAC authorization, wait some amount of time for admission controller (such as OPA) watch caches to sync, and then remove the admission policy. In an overloaded API server if both policies were revoked simultaneously, it's possible that an identity using the RBAC rule could have a request authorized, but the validation restrictive policy would get dropped, and a request would be improperly allowed through.

Moderators: @micahhausler @deads2k

@thockin
Copy link
Member

thockin commented Oct 22, 2024

Topic: Being a maintainer is hard - how exactly, and how can we make it better?

Description: The day-to-day, week-to-week, release-to-release job of being a maintainer of Kubernetes is hard. Perhaps unnecessarily so? In this session we can talk about what EXACTLY makes it hard, and what parts of that could be eliminated, streamlined, or delegated. We have lots of people who want to help, how can we enable them to? Where could we apply development energy to once-and-for-all overcome some of the "papercuts" that we all live with.

Moderators: @thockin @BenTheElder

@thockin
Copy link
Member

thockin commented Oct 29, 2024

Topic: Test code is real code - it needs to be good, too

Description: I often see test code which is "not quite as polished" as the "real" code. Every PR should come with tests, but few people have the incentives to clean up tests. We are all guilty of "just adding one more case to the table", without considering the bigger picture. The harder a test is to comprehend, the more likely it is that the test itself is broken. In this session we will discuss some strategies for simpler, more maintainable tests.

Moderators: @thockin

@BenTheElder
Copy link
Member

BenTheElder commented Oct 29, 2024

re: #7993 (comment)

[...] Kubernetes Network Plumbing Working Group [...]

We'd love to explore what it might look like to bring this group officially into the CNCF and to enable its contributors to officially serve and better collaborate with the community that it was formed around.

... have you all proposed a Kubernetes Community Workgroup? We have a well established formal concept of a Kubernetes Working Group:

https://github.com/kubernetes/community/blob/master/governance.md#community-groups
https://github.com/kubernetes/community/blob/master/governance.md#working-groups

This is a bit off-topic for the thread, but I think it might be more productive to follow established paths async and/or join the SIG Network meetings.

@dougbtv that feels like a discussion we'd need to have somewhere CNCF leadership is present. Like, it totally makes sense to me to make it a CNCF project -- or something? -- but I don't know what the TOC would want. And most TOC members will not be at the KCS.

If this were to become a CNCF level organization and not Kubernetes level, I'd at least expect a different name, "Kubernetes [...] Working Group" at the very least has a major naming collision with the project's own organization.

... but regardless, I agree that the Kubernetes Contributor Summit is unlikely to have the right people for discussing CNCF adoption of projects.

SIG Network could agree to host some of the projects under the Kubernetes organization, but that's also another conversation with an established path: "Repository creation/migration" issue type in github.com/kubernetes/org has more details:
https://github.com/kubernetes/org/issues/new?assignees=&labels=area%2Fgithub-repo&projects=&template=repo-create.yml&title=REQUEST%3A+%3CCreate+or+Migrate%3E+%3Cgithub+repo%3E

To start, raise the possibility to the SIG Leadership.

@satrox28

This comment was marked as off-topic.

@thockin

This comment was marked as off-topic.

@satrox28

This comment was marked as off-topic.

@thockin

This comment was marked as off-topic.

@satrox28

This comment was marked as off-topic.

@lauralorenz
Copy link
Contributor

lauralorenz commented Oct 30, 2024

Topic: E2E node test coverage

Description: Working session to collate and analyze current node E2E test coverage against key node features to, in priority order:

  1. identify gaps in feature coverage
  2. identify gaps in testing suite/framework maturity
  3. recommend test or test framework changes, deprecations or refactors.

The output of this working session is a doc containing the working session's findings to be shared to SIG-Node.

Moderator: TBD, co-presented by @SergeyKanzhelev

@lauralorenz
Copy link
Contributor

Topic: Pod lifecycle and related code health

Description: Begins with a short interest and feedback session to collect and socialize gaps in pod lifecycle management today. Followed by a working session to enumerate specific gaps in documentation and tests relating to the pod lifecycle, and brainstorm, including how to evaluate for feasibility, architectures to unify the state transition flow of pod lifecycle management (ref: state transition).

The output of this working session is

  • a list of interested contribs
  • a doc representing the current state, gaps in documentation and tests
  • an appendix in the doc with brainstorming outputs from the working session on alternatives/updates to pod lifecycle management

Moderator: @lauralorenz (yes I am attending in person)

@cblecker cblecker pinned this issue Nov 11, 2024
@cblecker cblecker unpinned this issue Nov 11, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/contributor-summit Issues or PRs related to all Contributor Summit events area/na-summit Issues or PRs related to the Contributor Summit in North America sig/contributor-experience Categorizes an issue or PR as relevant to SIG Contributor Experience.
Projects
None yet
Development

No branches or pull requests