@@ -97,6 +97,7 @@ tags, and then generate with `hack/update-toc.sh`.
97
97
- [ Integration tests] ( #integration-tests )
98
98
- [ e2e tests] ( #e2e-tests )
99
99
- [ Graduation Criteria] ( #graduation-criteria )
100
+ - [ Alpha] ( #alpha )
100
101
- [ Beta] ( #beta )
101
102
- [ GA] ( #ga )
102
103
- [ Upgrade / Downgrade Strategy] ( #upgrade--downgrade-strategy )
@@ -436,17 +437,23 @@ in back-to-back releases.
436
437
- Deprecate the flag
437
438
-->
438
439
439
- The feature is targeting directly to beta, with the feature gate enabled by
440
- default.
440
+ #### Alpha
441
+
442
+ - [ ] Feature implemented behind a feature flag, fallback to old behavior if flag is enabled but runtime support not present.
443
+ - [ ] Initial unit tests completed and enabled
444
+
441
445
442
446
#### Beta
443
447
444
448
- [ ] Feature implemented, with the feature gate enabled by default.
449
+ - [ ] Released versions of CRI-O and containerd runtime implementations support the feature
450
+ - [ ] Drop fallback to old behavior. CRI implementations expected to have support.
445
451
446
452
#### GA
447
453
448
- - [ ] released versions of CRI-O and containerd runtime implementations support the feature
449
454
- [ ] No bugs reported in the previous cycle.
455
+ - [ ] Remove fallback behavior
456
+ - [ ] Remove feature gate
450
457
451
458
### Upgrade / Downgrade Strategy
452
459
@@ -462,6 +469,11 @@ enhancement:
462
469
cluster required to make on upgrade, in order to make use of the enhancement?
463
470
-->
464
471
472
+ The fallback behavior specified in alpha will prevent the majority of regressions, as Kubelet will choose a cgroup driver,
473
+ same as it used to before this KEP, even when the feature gate is on.
474
+
475
+ The feature gate is another layer of protection, requiring admins to specifically opt-into this behavior.
476
+
465
477
### Version Skew Strategy
466
478
467
479
<!--
@@ -544,7 +556,7 @@ automations, so be extremely careful here.
544
556
Yes. If/when the runtime is updated to a version that supports this, kubelet
545
557
will ignore the cgroupDriver config option/flag. However, this change in
546
558
behavior should not cause any breakages (on the contrary, it should fix
547
- scenarios where the kubelet ` --cgorup -driver ` setting is incorrectly
559
+ scenarios where the kubelet ` --cgroup -driver ` setting is incorrectly
548
560
configured). With old versions of the container runtimes (that don't support
549
561
the new field in the CRI API) the default behavior is not changed.
550
562
0 commit comments