@@ -259,17 +259,6 @@ values means that the IPv4 `ExternalIP` will be preserved.
259
259
260
260
# ## Test Plan
261
261
262
- <!--
263
- **Note:** *Not required until targeted at a release.*
264
- The goal is to ensure that we don't accept enhancements with inadequate testing.
265
-
266
- All code is expected to have adequate tests (eventually with coverage
267
- expectations). Please adhere to the [Kubernetes testing guidelines][testing-guidelines]
268
- when drafting this test plan.
269
-
270
- [testing-guidelines] : https://git.k8s.io/community/contributors/devel/sig-testing/testing.md
271
- -->
272
-
273
262
[X] I/we understand the owners of the involved components may require updates to
274
263
existing tests to make this code solid enough prior to committing the changes necessary
275
264
to implement this enhancement.
@@ -395,10 +384,6 @@ value to a new single-stack value.
395
384
396
385
# ## Rollout, Upgrade and Rollback Planning
397
386
398
- <!--
399
- This section must be completed when targeting beta to a release.
400
- -->
401
-
402
387
# ##### How can a rollout or rollback fail? Can it impact already running workloads?
403
388
404
389
Assuming no drastic bugs (eg, the cloud provider assigns Node X's IP
@@ -435,21 +420,32 @@ correctly.
435
420
436
421
# ##### Were upgrade and rollback tested? Was the upgrade->downgrade->upgrade path tested?
437
422
438
- TODO; do a manual test
423
+ Not really applicable. Enable->disable->enable was tested and works
424
+ fine, but :
425
+
426
+ - " (feature is disabled) → upgrade → rollback" is uninteresting
427
+ since the feature is disabled
428
+
429
+ - " enable feature → upgrade" is impossible because you can't
430
+ enable the feature before upgrading to a release that supports it.
431
+
432
+ - " upgrade → enable feature → rollback" is expected to fail, because
433
+ the rolled-back-to kubelet will not support the configuration
434
+ with the feature enabled.
435
+
436
+ - " upgrade → enable feature → disable feature → rollback" is just a
437
+ combination of the (tested) enable→disable case with the
438
+ (uninteresting) upgrade→rollback case.
439
+
440
+ (The question seems more targeted at API objects rather than component
441
+ configuration.)
439
442
440
443
# ##### Is the rollout accompanied by any deprecations and/or removals of features, APIs, fields of API types, flags, etc.?
441
444
442
445
No.
443
446
444
447
# ## Monitoring Requirements
445
448
446
- <!--
447
- This section must be completed when targeting beta to a release.
448
-
449
- For GA, this section is required : approvers should be able to confirm the
450
- previous answers based on experience in the field.
451
- -->
452
-
453
449
# ##### How can an operator determine if the feature is in use by workloads?
454
450
455
451
The operator is the one who would be using the feature (and they can
479
475
480
476
# ## Dependencies
481
477
482
- <!--
483
- This section must be completed when targeting beta to a release.
484
- -->
485
-
486
478
# ##### Does this feature depend on any specific services running in the cluster?
487
479
488
480
The feature depends on kubelet/cloud provider communication, but it is
523
515
524
516
# ## Troubleshooting
525
517
526
- <!--
527
- This section must be completed when targeting beta to a release.
528
-
529
- For GA, this section is required : approvers should be able to confirm the
530
- previous answers based on experience in the field.
531
-
532
- The Troubleshooting section currently serves the `Playbook` role. We may consider
533
- splitting it into a dedicated `Playbook` document (potentially with some monitoring
534
- details). For now, we leave it here.
535
- -->
536
-
537
518
# ##### How does this feature react if the API server and/or etcd is unavailable?
538
519
539
520
It does not add any new failure modes. (The kubelet and cloud provider
@@ -543,19 +524,6 @@ but they _already_ do that. And the failure mode there is just
543
524
544
525
# ##### What are other known failure modes?
545
526
546
- <!--
547
- For each of them, fill in the following information by copying the below template :
548
- - [Failure mode brief description]
549
- - Detection : How can it be detected via metrics? Stated another way:
550
- how can an operator troubleshoot without logging into a master or worker node?
551
- - Mitigations : What can be done to stop the bleeding, especially for already
552
- running user workloads?
553
- - Diagnostics : What are the useful log messages and their required logging
554
- levels that could help debug the issue?
555
- Not required until feature graduated to beta.
556
- - Testing : Are there any tests for failure mode? If not, describe why.
557
- -->
558
-
559
527
# ##### What steps should be taken if SLOs are not being met to determine the problem?
560
528
561
529
N/A : there are no SLOs.
0 commit comments