summaryrefslogtreecommitdiff
path: root/sig-node/archive/meeting-notes-2019.md
blob: eaa1f73f488260427a0136a2aecc00d957afd55b (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
# SIG Node Meeting Notes

# Future

*   [Virtual Kubelet (@rbitia)](https://docs.google.com/document/d/1MAn_HMZScni89hDwI4nQMk_SWTx9oi16PuOREhpVJJI/edit?usp=sharing)
*   [Jess Frazelle / Kent Rancourt]: Proposal for kubelet feature to freeze pods placed in a hypothetical “frozen” state by the replication controller in response to a scale-down event. Enable pods to be thawed by socket activation.
*   `regular resource usage tracking resource tracking for 100 pods per node` => this e2e test has been failing (flaking?) quite consistently in release-blocking dashboards. Should we block the 1.14 release on this? If not, could you help resolve it? [Issue:75039](https://github.com/kubernetes/kubernetes/issues/75039) (@mariantalla)
*   Issue to discuss: [Hardware topology awareness at node level (including NUMA)](https://github.com/kubernetes/kubernetes/issues/49964)
*   OCI Hooks PreStart, PostStop - @alban
    *   Suggestion to add Kubernetes labels in the OCI State ([slide 15](https://docs.google.com/presentation/d/1i8csKAf15j3ZDeHxuUlHBDvHiBI44_UxATdaaAy-pjE/edit#slide=id.g5da9f7933e_0_51))
    *   Use case: [Inspektor Gadget](https://github.com/kinvolk/inspektor-gadget)
    *   Previous presentation at the OCI meeting, July 24th: [notes](https://hackmd.io/El8Dd2xrTlCaCG59ns5cwg?view) ; [slides](https://docs.google.com/presentation/d/1i8csKAf15j3ZDeHxuUlHBDvHiBI44_UxATdaaAy-pjE/edit)
    *   @RenaudWasTaken: [Improving the Device Plugin Mechanisms](https://docs.google.com/document/d/1wPlJL8DsVpHnbVbTaad35ILB-jqoMLkGFLnQpWWNduc/edit?usp=sharing)
*   Hugepages in 1.18([notes](https://docs.google.com/document/d/1Xnb3ioEH_JmWLdFJ-i6Lp7jFc_fDuzzAa2oEXJglBbM/edit#))


# December 24 & 31, 2019

*   Happy Holidays! No meeting 🎉🎉


# December 17, 2019



*   [klueska] Looking for review on **<code>CPUManager</code></strong> change:
    *   Blocking progress of moving <strong><code>TopologyManager</code></strong> into beta
    *   Overall issue: https://github.com/kubernetes/kubernetes/issues/83476
    *   Specific PR: https://github.com/kubernetes/kubernetes/pull/84462
*   [bart0sh] Request for review: multi-size hugepages: [#82820](https://github.com/kubernetes/kubernetes/pull/82820) and [#84051](https://github.com/kubernetes/kubernetes/pull/84051)
    *   Hugepages KEP update is already merged: [#1271](https://github.com/kubernetes/enhancements/pull/1271)
*   [michaelgugino] Discuss/request for review ‘Node Maintenance Lease’ KEP: https://github.com/kubernetes/enhancements/pull/1411
*   Issue: https://github.com/kubernetes/kubernetes/issues/85966


# December 10, 2019



*   [kkmsft,patricklang] Review alternate proposal to #[84486](https://github.com/kubernetes/kubernetes/pull/84486) discussed earlier - annotations in ImageManager with certain fields copied from PodSandboxConfig (runtimehandler). [Link ](https://docs.google.com/document/d/1S30VFhwdKyeuwFuGpCiN4XIIQYkScPqZZ5n_gfwWVy8/edit)
    *   ask: can Lantao review since this was based on in-person discussion at Kubecon?
    *   Will update existing KEP and change API sections to follow this approach.
*   [kad, RenaudWasTaken] WG-Resource-Management future
    *   kad and RenaudWasTaken to come up with written proposal/plan/goals for WG
*   [wojtek-t] Immutable Secrets/ConfigMaps ([KEP](https://github.com/kubernetes/enhancements/pull/1369))
*   [RainbowMango] Request for review and a proposal:
    *   https://github.com/kubernetes/kubernetes/pull/85446
    *   A suggestion for fast forwarding metrics stuff of kubelet.
*   [vpickard] Questions about doing E2E tests on NUMA nodes	 
*   ~~[klueska] Best method to migrate checkpointed state across kubelet upgrade~~
    *   ~~Needed to remove for this week since I can’t make it to the meeting anymore~~
    *   ~~Please see [this](https://github.com/kubernetes/kubernetes/pull/84462#issuecomment-550018667) and comment when you have time~~
*   [jaypipes] Currently working on repro'ing this bug: https://github.com/kubernetes/kubernetes/issues/79159
    *   I can reproduce the bug successfully but am a bit confused as to why I never see Allocatable.cpu for the node never get decremented. Is this number not intended to be decremented ever? i.e. does the scheduler keep the current number of static cores allocatable to each node in memory?


# December 03, 2019



*   [vinaykul, quinton-hoole] [In-Place Vertical Scaling KEP](https://github.com/kubernetes/enhancements/pull/686/commits/533c3c625a49b07fcbbf9449080f1a7b139c92f3) updates
    *   K8s contributor summit [Live API review](https://docs.google.com/presentation/d/16-R9gEpKF6nyzDNtA5JDsKzQzr_vF_ZevN0ezZVYHpk/edit#slide=id.g78e88100d6_0_23) session with @liggitt, @thockin
    *   Next steps
*   [mrunal/giuseppe] Cgroup V2 updates
    *   KEP - https://github.com/kubernetes/enhancements/pull/1370
    *   How does this relate to PR https://github.com/containerd/containerd/pull/3799 ?
*   [bg.chun] CRI Update(for hugepages) review ([slides](https://docs.google.com/presentation/d/1H5xhCjgCZJjdTm-mGUFwqoz8XmoVd8xTCwJ1AfVR_54/edit?usp=sharinghttps://docs.google.com/presentation/d/1H5xhCjgCZJjdTm-mGUFwqoz8XmoVd8xTCwJ1AfVR_54/edit?usp=sharing))
    *   [CRI Update PR](https://github.com/kubernetes/kubernetes/pull/83614), [Hugepages KEP PR(merged)](https://github.com/kubernetes/enhancements/pull/1199), Hugepages in 1.18([notes](https://docs.google.com/document/d/1Xnb3ioEH_JmWLdFJ-i6Lp7jFc_fDuzzAa2oEXJglBbM/edit#))
*   [patricklang] Can we get a review on a test simplification for some SIG-Node owned tests? https://github.com/kubernetes/kubernetes/pull/84788 - Yu-ju reviewed ✔️ Thanks!
*   [bart0sh] Request for review: multi-size hugepages: [#82820](https://github.com/kubernetes/kubernetes/pull/82820) and [#84051](https://github.com/kubernetes/kubernetes/pull/84051)

    Hugepages KEP update is already merged: [#1271](https://github.com/kubernetes/enhancements/pull/1271)



# November 12, 2019



*   [verb] Promoting shareProcessNamespace to GA ([#84356](https://pr.k8s.io/84356))
    *   ready for 1.17
*   [verb] Updates on pod troubleshooting and kubectl debug ([KEP](https://features.k8s.io/1204))
    *   API updated in 1.16
    *   Worked out plan for kubectl debug with sig-cli
        *   (forgot to mention) the current plan is to have functionality to allow node-level debugging, via `kubectl debug node` launching a privileged container in the host namespace
    *   CRI update pending to allow process namespace targeting
    *   Enhancement [#277](https://features.k8s.io/277) has rough roadmap
*   [bg.chun] asking CRI update for hugepages in 1.17 Rel(slides/TBD)
    *   [CRI Update PR](https://github.com/kubernetes/kubernetes/pull/83614), [Hugepages KEP PR(merged)](https://github.com/kubernetes/enhancements/pull/1199)
*   [vinaykul, quinton-hoole] [In-Place Vertical Scaling KEP](https://github.com/kubernetes/enhancements/pull/686/commits/533c3c625a49b07fcbbf9449080f1a7b139c92f3)
    *   Discuss [mini-KEP for Container resources CRI extension/update](https://github.com/kubernetes/enhancements/pull/1342) changes
        *   Remove GetContainerResources, extend ContainerStatus API.
        *   ContainerResources struct will be oneof
    *   Status: Awaiting API review
*   [patricklang, kkmsft, tallclair] - 1.17 action needed - closing on RuntimeHandler updates. What would it take to get to /approve from SIG-Node?
    *   Diagram added to [Discussion Slides](https://docs.google.com/presentation/d/11x6giWCYk1JGt3QFrcbS-m_Q9mcxIz_T0-RGhhSndf4/edit?usp=sharing)
    *   https://github.com/kubernetes/kubernetes/pull/84486
    *   Scope:
        *   Use runtime class to choose hyperV / process isolation;
            *   add PodSandboxConfig if needed to EnsureImage / GetImageRef
        *   Support OS version;
        *   Multiple snapshots will be another KEP.
*   [patricklang] - 1.17 action needed - approver for kubelet Windows version labelling: https://github.com/kubernetes/kubernetes/pull/84472 . Got API feedback/approve from Jordan, will need someone for kubelet
*   
*   [bart0sh] 1.17 action needed: review of pending Hugepages PRs: https://github.com/kubernetes/kubernetes/issues/84526

    https://docs.google.com/document/d/1Xnb3ioEH_JmWLdFJ-i6Lp7jFc_fDuzzAa2oEXJglBbM/edit#



# November 5, 2019



*   [klueska,RenaudWasTaken] [Improving the Device Plugin Mechanisms](https://docs.google.com/document/d/1wPlJL8DsVpHnbVbTaad35ILB-jqoMLkGFLnQpWWNduc/edit?usp=sharing)
*   [kad,klihub,marquiz,bart0sh] [Container Device Interface](https://docs.google.com/document/d/1Tc0Kc4GDWx1gFvGQbBUizudSuND6Kq8GiH7KVm_X5eg/edit#heading=h.5lakm98lya8j)
*   ~~[jirving] proposed changes/rewording of sidecars kep https://github.com/kubernetes/enhancements/pull/1344 - reviewed thanks!~~
*   [patricklang,kkmsft,tallclair] Need decision on adding RuntimeHandler to PodSandboxConfig vs individual methods (Pull/List/RemoveImage)
    *   [Discussion Slides](https://docs.google.com/presentation/d/11x6giWCYk1JGt3QFrcbS-m_Q9mcxIz_T0-RGhhSndf4/edit?usp=sharing) , [KEP](https://github.com/kubernetes/enhancements/blob/master/keps/sig-windows/windows-runtimeclass-support.md)
    *   https://github.com/kubernetes/kubernetes/pull/84486
    *   Q: should runtimeHandler move into PodSandboxConfig, or stay separate?
    *   Also have [PR#84472](https://github.com/kubernetes/kubernetes/pull/84472) ready for review with node label `node.kubernetes.io/windows-build. `Who can review?
*   [vinaykul, quinton-hoole] [In-Place Vertical Scaling KEP](https://github.com/kubernetes/enhancements/pull/686/commits/533c3c625a49b07fcbbf9449080f1a7b139c92f3)
    *   Discuss [mini-KEP for Container resources CRI extension/update](https://github.com/kubernetes/enhancements/pull/1342)
        *   Q: Remove GetContainerResources, extend ContainerStatus API?
        *   ContainerResources struct will be oneof
    *   Awaiting scheduling of API review
*   [klueska] TopologyManager status / reviews
    *   [At risk of not making it for 1.17](https://github.com/kubernetes/kubernetes/issues/83479)
    *   https://github.com/kubernetes/kubernetes/pull/84525
*   


# October 29, 2019



*   [bg.chun] Asking for a review for pending PRs for hugepage enhancements
    *   [Hugepages PRs](https://docs.google.com/document/d/1Xnb3ioEH_JmWLdFJ-i6Lp7jFc_fDuzzAa2oEXJglBbM/edit#)
*   [tallclair,draveness] Node-local API cache [#84248](https://github.com/kubernetes/kubernetes/issues/84248)
    *   notes: https://github.com/kubernetes/kubernetes/issues/84248#issuecomment-547539826
*   [vinaykul, quinton-hoole] [In-Place Vertical Scaling KEP](https://github.com/kubernetes/enhancements/pull/686/commits/533c3c625a49b07fcbbf9449080f1a7b139c92f3)
    *   Kick-off review of [mini-KEP for Container resources CRI extension/update](https://github.com/kubernetes/enhancements/pull/1342)
    *   Quick [prototype code](https://github.com/vinaykul/kubernetes/commit/4f2c9f08d0797b208ea137f6734de5c58230995a) for above mini-KEP.
    *   Schedule API review (opened PR for moving parent KEP to implementable)
*   [patricklang,kkmsft,tallclair] Review approach to runtimeHandler for CRI
    *   https://github.com/kubernetes/kubernetes/pull/84486
    *   Q: should runtimeHandler move into PodSandboxConfig, or stay separate?
*   [jirving] Request review of Sidecars PR https://github.com/kubernetes/kubernetes/pull/80744
    *   Should sidecars/non-sidecars share the TerminationGracePeriod or should they each get TerminationGracePeriod to terminate in?
    *   Should sidecars be included in Pod phase calculation? i.e should a sidecar that exited badly make the pod ‘Failed’ ?
    *   API has been reviewed by @thockin, some small changes were suggested https://github.com/kubernetes/kubernetes/pull/79649
*   @Kevin Klues, @RenaudWasTaken: [Improving the Device Plugin Mechanisms](https://docs.google.com/document/d/1wPlJL8DsVpHnbVbTaad35ILB-jqoMLkGFLnQpWWNduc/edit?usp=sharing)
*   [kad,klihub,marquiz,bart0sh] [Container Device Interface](https://docs.google.com/document/d/1Tc0Kc4GDWx1gFvGQbBUizudSuND6Kq8GiH7KVm_X5eg/edit#heading=h.5lakm98lya8j)


# October 22, 2019



*   [vinaykul] [In-Place Vertical Scaling KEP](https://github.com/kubernetes/enhancements/pull/686/commits/533c3c625a49b07fcbbf9449080f1a7b139c92f3)
    *   Review first-stab at [proposed CRI change](https://github.com/kubernetes/enhancements/issues/1287#issuecomment-544809736) to support Windows containers.
    *   API review prep [document](https://docs.google.com/presentation/d/16-R9gEpKF6nyzDNtA5JDsKzQzr_vF_ZevN0ezZVYHpk/edit?usp=sharing) - any comments?
    *   Review open issues https://github.com/kubernetes/enhancements/issues/1287
    *   Help schedule API review with @thockin
*   TODO for next week: discuss hooks/device plugins improvements. Nvidia+Intel [doc](https://docs.google.com/document/d/1wPlJL8DsVpHnbVbTaad35ILB-jqoMLkGFLnQpWWNduc/edit#)


# October 15, 2019



*   Enhancements (KEP) freeze today
    *   https://github.com/kubernetes/enhancements/pull/1148
    *   https://github.com/kubernetes/enhancements/pull/1243
*   [patricklang, tallclair] RuntimeClass for multi-arch and os versions
    *   enhancement [#1301](https://github.com/kubernetes/enhancements/issues/1301) filed for 1.17, KEP [#1302](https://github.com/kubernetes/enhancements/pull/1302) opened based off last week’s discussion
*   [pjbgf] Seccomp: new built-in profiles, complain mode and ConfigMaps
    *   https://github.com/kubernetes/enhancements/pull/1269
    *   https://github.com/kubernetes/enhancements/pull/1257
*   [vinaykul] [In-Place Vertical Scaling KEP](https://github.com/kubernetes/enhancements/pull/686/commits/533c3c625a49b07fcbbf9449080f1a7b139c92f3) - status update & next steps
    *   Tracking to v1.18 milestone now
    *   API review prep [document](https://docs.google.com/presentation/d/16-R9gEpKF6nyzDNtA5JDsKzQzr_vF_ZevN0ezZVYHpk/edit?usp=sharing)
    *   Outstanding issues https://github.com/kubernetes/enhancements/issues/1287
    *   Help scheduling API review with @thockin


# October 8



*   [mikebrow, kad, klueska, Lantao] Support OCI hooks in Kubernetes (continue ...)
    *   Renaud Gaubert: https://github.com/containerd/cri/pull/1248#issuecomment-537366588: Can we move the device support down to container runtime, and define runtime device plugin? In this way:
        *   The device can be supported in the container runtime with lower level information, and can probably avoid arbitrary OCI hooks, which is hacky;
        *   The same logic can be shared by Kubernetes, Docker and podman etc. instead of having different implementations in each.
        *   Containerd knows better how to support different runtimes, e.g. runc, kata, gvisor etc.
    *   Jiaying:
        *   The idea sounds reasonable to GPU, we may want to think about other plugins and general Kubernetes use cases.
    *   **TODO: Let’s have a written doc about **
        *   https://github.com/containerd/cri/pull/1248#issuecomment-537366588. (Renaud Gaubert)
        *   Participants in document proposal: Renaud, Kevin, Alexander, Ed, Zhipeng (Howard) Huang
*   [klueska] Review TopologyManager extension mentioned by @derekwaynecarr
    *   https://github.com/kubernetes/enhancements/pull/1121
*   [patricklang, tallclair] RuntimeClass for multi-arch and os versions
    *   Approaches to multi-version support
        *   Please review this [doc outlining the problems & approach](https://docs.google.com/document/d/12uZt-KSG8v4CSyUDr0EC6btmzpVOZAWzqYDif3EoeBU/edit?usp=sharing)  first - it outlines the directions we need to decide along with SIG-Node and SIG-Architecture
        *   Once we agree on the path forward, it will be moved out into KEPs such as https://github.com/kubernetes/enhancements/pull/1254
*   [vinaykul] [In-Place Vertical Scaling KEP](https://github.com/kubernetes/enhancements/pull/686/commits/533c3c625a49b07fcbbf9449080f1a7b139c92f3) - status update.
    *   Approved and merged as provisional.
    *   Outstanding issues https://github.com/kubernetes/enhancements/issues/1287
    *   Identify a few time-slots to schedule API review with @thockin
*   [dims] PR for [Moving external facing kubelet APIs to staging](https://github.com/kubernetes/kubernetes/pull/83551) is ready. Need reviews!


# October 1



*   [mikebrow, lantaol] Support OCI hooks in Kubernetes:
    *   Containerd issue: https://github.com/containerd/cri/issues/405
    *   WIP Containerd PR: https://github.com/containerd/cri/pull/1248, basically the current idea is to model OCI hooks similar with seccomp/apparmor profile:
        *   The OCI hook details are defined on the node in hook config files (profiles). The reason is that OCI hooks run in the [host (runtime) namespace](https://github.com/opencontainers/runtime-spec/blob/master/config.md#posix-platform-hooks), so it is very specific to the node environment, e.g. it may directly invoke binaries in the host filesystem.
        *   Each group of OCI hooks is referenced by a name (hook name, similar to seccomp profile name or runtime handler);
        *   What hooks to run is from CRI, and Device Plugin will be the only user right now.
    *   cri-o approach: 
        *   oci-hooks are defined on the node via set of [json files](https://www.mankier.com/5/oci-hooks). 
        *   Hooks are executed when the condition is met. 
        *   Container annotations that are passed down from CRI to OCI can be used as a condition. Device Plugins can set those annotations. 
    *   Use cases:
        *   https://speakerdeck.com/kad/extending-kubernetes-with-intel-r-accelerator-devices
        *   https://docs.google.com/document/d/1VNIDKgRnn1dL9hnNdaaTdiJFrEGDAhROVJAHMOyingI/edit?usp=sharing
            *   Device plugin:
                *   It doesn’t handle container restart
                *   Not enough information
                *   Cleanup the device
        *   [Inspektor Gadget](https://github.com/kinvolk/inspektor-gadget) use OCI hooks and would like OCI annotations with pod uid, container id and pod labels (see [slide 15](https://docs.google.com/presentation/d/1i8csKAf15j3ZDeHxuUlHBDvHiBI44_UxATdaaAy-pjE/edit#slide=id.g5da9f7933e_0_51) and [notes](https://hackmd.io/El8Dd2xrTlCaCG59ns5cwg?view) from OCI meeting) [@alban]
        *   Main feedback we get about the device plugin interface:
            *   Not full container lifecycle is under control, e.g. cleanup the device after container exits; response: (if runc’s hook types are insufficient we should bring that to the runtime spec team as an issue) 

                We should be able to enable all hook types at the CRI runtime layer.

            *   Lack of information. Most of the information can be retrieved by Kubelet, but not passed into device plugin yet.
                *   Previous PR discussing using annotations: https://github.com/kubernetes/kubernetes/pull/61775
*   [mvladev] [Master Service of type ExternalName KEP](https://github.com/kubernetes/enhancements/pull/1216) feedback
    *   kubelet [PR](https://github.com/kubernetes/kubernetes/pull/79312)
*   [yjhong] Beta CoreOS image in node e2e ([issue](https://github.com/kubernetes/test-infra/issues/14465), [PR](https://github.com/kubernetes/test-infra/pull/14466)); current [image config](https://github.com/kubernetes/test-infra/blob/master/jobs/e2e_node/image-config.yaml).
*   [lantaol, patricklang] Plan and status update of Kubernetes containerd Windows support alpha.
    *   https://github.com/kubernetes/enhancements/blob/master/keps/sig-windows/20190424-windows-cri-containerd.md#alpha-release-proposed-117
    *   Draft updates to handle multi os version & runtimeclass
        *   https://github.com/kubernetes/enhancements/pull/1254 
    *   Project board: https://github.com/orgs/kubernetes/projects/34
    *   Recent meeting notes: https://docs.google.com/document/d/1PKlmTIh0-qSzGDPhYmc_5BJjdD9GRdMGIATzvlhUAwM/edit?usp=sharing
    *   Containerd windows CRI validation test: https://k8s-testgrid.appspot.com/sig-node-containerd#cri-validation-windows
    *   Containerd windows Kubernetes e2e test: https://k8s-testgrid.appspot.com/sig-windows#containerd-l2bridge-windows-master (Still using forked containerd right now, will setup one with upstream containerd soon)
*   [vinaykul] [In-Place Vertical Scaling KEP](https://github.com/kubernetes/enhancements/pull/686/commits/533c3c625a49b07fcbbf9449080f1a7b139c92f3) - just a status update.
    *   Approval from sig-node and sig-scheduling.
    *   Awaiting @kgolab lgtm and @mwielgus approve, API review and next steps.


# September 24



*   [vinaykul] [In-Place Vertical Scaling KEP](https://github.com/kubernetes/enhancements/pull/686/commits/533c3c625a49b07fcbbf9449080f1a7b139c92f3) review follow-up and status update.
    *   Identify approver from sig-node to list in the KEP approvers list.
*   [bg.chun] update hugepages KEP([slide](https://docs.google.com/presentation/d/1H5xhCjgCZJjdTm-mGUFwqoz8XmoVd8xTCwJ1AfVR_54/edit?usp=sharing))
    *   [Update huge pages KEP for NUMA support of huge pages](https://github.com/kubernetes/enhancements/pull/1245)
    *   [Update huge pages KEP for container isolation of huge pages](https://github.com/kubernetes/enhancements/pull/1199)
*   [harche/lumjjb] Update on Image Decryption KEP
    *   https://github.com/kubernetes/enhancements/pull/1066*   [klueska] Discuss TopologyManager enhancements for 1.17 / beta
    *   https://docs.google.com/document/d/1YTUvezTLGmVtEF3KyLOX3FzfSDw9w0zB-s2Tj6PNzLA/edit#


# September 17



*   [vinaykul] Review follow-up for [In-Place Vertical Scaling KEP](https://github.com/kubernetes/enhancements/pull/686/commits/533c3c625a49b07fcbbf9449080f1a7b139c92f3). Discuss next steps.

Updates:



    *   Reviewed with sig-scheduling last Thu, Abdullah and Bobby are fine with it.
    *   Updated sig-autoscaling today, requested approval - they will look this week.
    *   No word from sig-arch yet for API review request.


# September 10



*   [vinaykul] Review updates to [In-Place Vertical Scaling KEP](https://github.com/kubernetes/enhancements/pull/686/commits/533c3c625a49b07fcbbf9449080f1a7b139c92f3) from previous week.

Updates:



    *   Restate Kubelet restart resize handling to minimum guarantees.
    *   Clarify scheduler role - requested sig-scheduling review
*   [bg.chun] Discuss [update existing hugepages kep](https://github.com/kubernetes/enhancements/pull/1199) \
key points
    *   Update CRI to support container isolation of huge pages
        *   Issue: [Support Container Isolation of Hugepages](https://github.com/kubernetes/kubernetes/issues/80716)
        *   PR: TBD
    *   Update cAdvisor to discover hugepages per NUMA node
        *   cAdvisor PR: [Add hugepage info to v1 node structure](https://github.com/google/cadvisor/pull/2304)
*   [danbeaulieu] https://github.com/kubernetes/kubernetes/issues/82440


# September 03



*   [vinaykul] Review updates to [In-Place Vertical Scaling KEP](https://github.com/kubernetes/enhancements/pull/686/commits/533c3c625a49b07fcbbf9449080f1a7b139c92f3) from previous week.

Key changes:



    *   Call out details of Kubelet-APIServer interaction in handling Pod resize.
        *   Scheduling a API review with SIG API.
    *   Move eviction of lower priority Pods to Future work section.
    *   Remove Pod departure as a trigger for resize retries.
    *   Call out details of Static CPU manager policy resize handling.
*   [harche/lumjjb] Update on Image Decryption KEP
    *   
https://github.com/kubernetes/enhancements/pull/1066*   [Seth] Discuss https://github.com/kubernetes/kubernetes/pull/81858
    *   about “extended resources via kubelet flag?"



# August 27th



*   [vinaykul] Kick-off review of u[pdated Vertical Scaling KEP](https://github.com/kubernetes/enhancements/pull/686#). The design has been updated as per consensus achieved from discussions over the past few weeks.

Key changes in [this commit](https://github.com/kubernetes/enhancements/pull/686/commits/bc9dc2beb57d6d3a3c39fd2987f7714658562dde):



    *   PodSpec holds ResourcesAllocated for Pod’s Containers on Node
    *   ‘resourceallocation’ subresource for Kubelet to set/update ResourcesAllocated
    *   Kubelet restart fault tolerance section from [KEP discussion](https://github.com/kubernetes/enhancements/pull/686#discussion_r311136176) 
    *   Remove Resizing PodCondition 
*   [csadeniyi] Request a status update on: Clear the NodeSelector when loading checkpointed Pods from disk: https://github.com/kubernetes/kubernetes/pull/72202


# August 20th



*   [vinaykul] Continue Vertical Scaling KEP review
    *   Review Kubelet restart handling flow for node-local ResourcesAllocated source-of-truth:  https://github.com/kubernetes/enhancements/pull/686#discussion_r308785033
    *   https://github.com/kubernetes/enhancements/pull/686#discussion_r311136176
        *   Decide whether to store accepted resize [node-locally or in PodSpec](https://github.com/kubernetes/enhancements/pull/686#discussion_r313656371)
        *   Decide if we want to have Resize PodCondition  
    *   dashpole@’s slide deck: https://docs.google.com/presentation/d/1YRFrZT1ISBZa3ZSKeL2eyIQFFGVbtUSXM2Hnfj8SteI/edit#slide=id.p


# August 13th



*   [harche/lumjjb] Update on Image Decryption KEP
    *   
https://github.com/kubernetes/enhancements/pull/1066*   Next Step:
        *   Need approval from Derek and Dawn
        *   Lantao will be the reviewer from sig-node.
*   [vinaykul] Continue Vertical Scaling KEP review
    *   Review Kubelet restart handling flow for node-local ResourcesAllocated source-of-truth:  https://github.com/kubernetes/enhancements/pull/686#discussion_r308785033
    *   https://github.com/kubernetes/enhancements/pull/686#discussion_r311136176
*   [cadeniyi] Requesting review

    https://github.com/kubernetes/kubernetes/pull/72202


    AI: find the reviewer: yjhong?

*   [klueska] Limiting the supported socket count when TopologyManager enabled
    *   HintProviders (in the worst case) need to enumerate all possible socket masks and generate hints for them \
	→ results in 2^n -1 masks, where n is the number of sockets \
	→ state explosion for large number of sockets
    *   What is the best way to safeguard against this?
        *   Fail the kubelet if the machine has more than (e.g.) 8 sockets and TopologyManager is enabled?
        *   Wait until a pod with topology aligned resources tries to launch and fail the pod without attempting to enumerate the socket masks?


# August 6th



*   Should pod overheads be considered for eviction handling - see https://github.com/kubernetes/kubernetes/issues/80993
*   handling node shutdown - see KEP https://github.com/kubernetes/enhancements/pull/1116 
*   code organization for kubeadm validators - see https://github.com/kubernetes/kubeadm/issues/1638 (Added by yassine)
*   Requesting Reviews:
        *   Switch to k8s.io/utils/inotify - [PR #80689](https://github.com/kubernetes/kubernetes/pull/80689)  (Added by dims on behalf of sig-arch/code-org efforts)
    *   upgrade vishvananda/netlink to v1.0.0 - [PR #80290](https://github.com/kubernetes/kubernetes/pull/80290) (Added by dims on behalf of sig-arch/code-org efforts)
    *   Add ImageFSInfo, ContainerStats, and ListContainerStats impl for linux to dockershim - [PR #80105](https://github.com/kubernetes/kubernetes/pull/80105) (Added by dims to help with the dockerd CRI split effort)
*   [vinaykul] Continue Vertical Scaling KEP review
    *   Review Kubelet restart handling flow for node-local ResourcesAllocated source-of-truth:  https://github.com/kubernetes/enhancements/pull/686#discussion_r308785033
    *   https://github.com/kubernetes/enhancements/pull/686#discussion_r311136176
    *   


# July 30



*   [jaypipes] Request a status update on [node-level userspace remapping work](https://github.com/kubernetes/enhancements/issues/127) from either @derekwaynecarr or @vikaschoudhary16
    *   Is this stuck waiting on reviews? Stuck on implementation or design debate? Is there anything that EKS team members can contribute to speed this along?
    *   There are resource constraints on RH side, plus it's de-prioritized. Jay will reach out to the customer who is asking about this feature and determine if there is an alternate solution to the problem and whether the user ID remapping solution would be solving the problem fully in a unique way for the customer. EKS team may contribute resources to reignite Vikas' original PR if customer feels user ID remapping is the most viable solution (and EKS team feels the proposed implementation is viable as well)
*   [derekwaynecarr] Need to fix up our mailing list settings
    *   https://github.com/kubernetes/community/issues/3927
    *   Dawn - Fixed the setting.
*   [derekwaynecarr] 1.16 Feature Freeze items
*   [klueska] Blocking TopologyManager PRs:

    (All other PRs currently depend on these and require a rebase once they are merged)


    (Once these are merged, all other changes should be isolated to cm)

    *   https://github.com/kubernetes/kubernetes/pull/74357 \
(approved in cm, needs approval from OWNER in cmd/kubelet, pkg/kubelet)
    *   https://github.com/kubernetes/kubernetes/pull/74423 \
(needs approval from OWNER in pkg/kubelet)
*   [vinaykul] Vertical Scaling KEP
    *   Review Kubelet restart handling flow for node-local ResourcesAllocated source-of-truth:  https://github.com/kubernetes/enhancements/pull/686#discussion_r308785033
*   [verb] [#80645](https://pr.k8s.io/80645): Assigning sig-node as owner of pods integration tests
    *   wants approval from Dawn & Derek 
*   [tallclair] seccomp to GA
    *   https://github.com/kubernetes/enhancements/pull/1148


# July 23



*   [vinaykul] Continue review of updated Vertical Scaling KEP. https://github.com/kubernetes/enhancements/pull/686
    *   Move ResourcesAllocated into PodSpec w/ subresource update by Kubelet only vs. Node-local storage of current container requests/limits info to discover it in case of Kubelet restart.
    *   Keep ResizingPod condition to enable VPA to quickly know if it should evict in case of resize failure due to capacity. This avoids cluster resource waste.
*   [harche/Brandon] image decryption kep discussion/introduction
    *   
https://github.com/kubernetes/enhancements/pull/1066*   Kubecon CN Demo: https://www.youtube.com/watch?v=bzHPnlSfM_8
    *   Note: The feature author wants to target Kubernetes 1.16, Dawn thinks that 1.17 might be more reasonable timeline. Feature authors are okay with 1.17 target!
*   [dawnchen] https://github.com/kubernetes/kubernetes/issues/80203 
    *   Agreed on https://github.com/kubernetes/kubernetes/issues/80203#issuecomment-514333789
*   [tallclair] seccomp to GA
    *   https://github.com/kubernetes/enhancements/pull/1148
*   [sashayakovtseva] https://github.com/kubernetes/kubernetes/issues/79803 
*   [klueska] Outstanding TopologyManager PRs
    *   ~~Not a part of the enhancements tracking sheet for 1.16 yet (should we add it?) \
https://docs.google.com/spreadsheets/d/1txj0SuCJGm_uDCcJJDx_IjrfhlSnW-thtfQY91oXRLo/edit#gid=0~~
    *   https://github.com/kubernetes/kubernetes/pull/74357 \
(approved in cm, needs OWNER in kubelet to approve)
    *   ~~https://github.com/kubernetes/kubernetes/pull/80294 \
(follow up / cleanup PR for [74357](https://github.com/kubernetes/kubernetes/pull/74357))~~

        ~~(needs approval from OWNER in cm)~~

    *   ~~https://github.com/kubernetes/kubernetes/pull/80301 \
(approved in cm, needs OWNER in kubelet to approve) ~~
    *   https://github.com/kubernetes/kubernetes/pull/74423 \
(needs approval from OWNER in kubelet)
    *   ~~https://github.com/kubernetes/kubernetes/pull/80315~~

        ~~(needs approval from OWNER in cm)~~

    *   https://github.com/kubernetes/kubernetes/pull/73920 \
(needs rebase onto master once [74357](https://github.com/kubernetes/kubernetes/pull/74357) merges)

        (needs approval from OWNER in cm)

    *   ~~https://github.com/kubernetes/kubernetes/pull/74345 \
(needs rebase onto master once [74357](https://github.com/kubernetes/kubernetes/pull/74357) merges)~~

        ~~(has known bugs → [follow-up PR to fix](https://github.com/klueska/kubernetes/tree/upstream-get-topology-hints-map) and change internal interface) \
(needs approval from OWNER in cm)~~

    *   https://github.com/klueska/kubernetes/commits/upstream-get-topology-hints-map

        (Not a PR yet (only top 6 commits will be in PR)) \
(waiting for all above to merge before creating it)


        (will need approval from OWNER in cm)

*   https://github.com/moshe010/kubernetes/commit/64b4d86e607ae5a532995976915f00a31beb5300

        (Not yet a PR, waiting for all above to merge before creating it)


        (will need approval from OWNER in cm)

*   Review request
    *   https://github.com/kubernetes/kubernetes/pull/80105 (added by dims)
    *   https://github.com/kubernetes/enhancements/pull/866 (added by dims)
    *   https://github.com/kubernetes/kubernetes/pull/75229 (added by andrewsykim)
*   [bg.chun] New Feedback for “strict” policy of Topology Manager(just asking a review)
    *   https://docs.google.com/document/d/1Ytz-Qzwz65MvXOODmz9SDouN6MbyoOiZ_spaz61cUIQ/edit \



# July 16



*   Discuss interest in solving [#79389](https://github.com/kubernetes/kubernetes/issues/79389) via fallbackImages KEP (icelynjennings)
    *   https://docs.google.com/document/d/1ho1SOZ5PzkcKeSpRYVYVOht4pG5758uP_34twOWVabA/edit
    *   Conclusion: Current Container Runtime implementation satisfied the original request, we are closing the request. Thanks for the discussion.
*   [vinaykul] Continue review of updated Vertical Scaling KEP. https://github.com/kubernetes/enhancements/pull/686
    *   Move ResourcesAllocated into PodSpec w/ subresource update by Kubelet only vs. Node-local storage of current container requests/limits info to discover it in case of Kubelet restart.
    *   Keep ResizingPod condition to enable VPA to quickly know if it should evict in case of resize failure due to capacity.
*   [Lmdaly] Topology Manager 1.16 Update and Review remaining PRs:
    *   https://github.com/kubernetes/kubernetes/issues/72828
    *   PRs to be approved (in merge order):
        *   https://github.com/kubernetes/kubernetes/pull/79343
        *   https://github.com/kubernetes/kubernetes/pull/73580
        *   https://github.com/kubernetes/kubernetes/pull/74357
        *   https://github.com/kubernetes/kubernetes/pull/73920
        *   https://github.com/kubernetes/kubernetes/pull/74423
        *   https://github.com/kubernetes/kubernetes/pull/74345
*   [klueska] Topology Manager Update Proposals
    *   https://docs.google.com/document/d/1g5Aqa0BncQGRedSJH0TJQWq3mw3VxpJ_ufO1qokJ1LE/edit
    *   https://github.com/kubernetes/enhancements/pull/1121
    *   https://github.com/kubernetes/enhancements/pull/1131
*   [klueska] Ping on review for proper support for init Containers in the CPUManager
    *   https://github.com/kubernetes/kubernetes/pull/78762
*   [mvladev] Environment variable support for Master service of type ExternalName PR:
    *   https://github.com/kubernetes/kubernetes/pull/79312 
        *   Reviewer: tallclaire, dawnchen
    *   issue: https://github.com/kubernetes/kubernetes/issues/79280 


# July 9



*   Discuss interest in solving [#79389](https://github.com/kubernetes/kubernetes/issues/79389) via fallbackImages KEP (icelynjennings)
    *   https://docs.google.com/document/d/1ho1SOZ5PzkcKeSpRYVYVOht4pG5758uP_34twOWVabA/edit
    *   Since Icelyn is not available today, we postponed this to next week.
*   Add startupProbe to health checks - design and implementation was changed from the initial proposal: adding initializationFailureThreshold to adding pod-startup liveness-probe. (matthyx)
    *   https://github.com/kubernetes/kubernetes/pull/77807#issuecomment-505705292
*   [vinaykul] Continue review of Vertical Scaling KEP updates. https://github.com/kubernetes/enhancements/pull/686
*   [hankang, ehashman] cadvisor metrics deprecation
    *   https://github.com/kubernetes/enhancements/blob/master/keps/sig-instrumentation/20181106-kubernetes-metrics-overhaul.md#cadvisor-instrumentation-changes  
    *   https://github.com/kubernetes/kubernetes/pull/69099 
*   image decryption kep discussion/introduction
    *   https://github.com/kubernetes/enhancements/pull/1066


# July 2

Meeting canceled


# June 25



*   [jirving] Sidecars kep implementable? https://github.com/kubernetes/enhancements/pull/1109
*   [vinaykul] Review/discuss updated Vertical Scaling KEP. https://github.com/kubernetes/enhancements/pull/686
*   [vinaykul] Per-Pod in,out network bandwidth requests & limits idea feasible? (This is different from bandwidth annotations today as scheduler would consider this as a resource during scheduling similar to cpu/memory)
*   [klueska] Proper support for init Containers in the CPUManager static policy

    https://github.com/kubernetes/kubernetes/pull/78762

*   [yastij, smarterclayton] pod checkpointing and pod-safety https://github.com/kubernetes/enhancements/issues/1103 
*   [yastij, smarterclayton] handling of pod startup for the node shutdown KEP
*   [mvladev] Environment variable support for Master service of type ExternalName

	https://github.com/kubernetes/kubernetes/pull/79312 



*   


# June 18



*   [btyler] Discuss Commit Class KEP: https://github.com/kubernetes/enhancements/pull/1078
*   [marquiz] New Git repository (under kubernetes-sigs org) for Node Feature Discovery Operator \
https://github.com/kubernetes-sigs/node-feature-discovery/issues/205
*   [vinaykul] Discuss Vertical Scaling updated design

	https://github.com/kubernetes/enhancements/pull/686#

	* Can we safely evict lower priority Pods from Kubelet??

	


# June 11

Cancelled.


# June 4

in



*   [patricklang] Fixing issue found with podResources enabled by default - [Windowskubelet won't start "Failed to create listener for podResources endpoint"](https://github.com/kubernetes/kubernetes/issues/78628#) 
    *   2 PRs open with slightly different approaches #[78670](https://github.com/kubernetes/kubernetes/pull/78670) / #[78671](https://github.com/kubernetes/kubernetes/pull/78671) - feedback? need to merge today and will need approver
    *   Device plugin isn’t tested on Windows either - @dashpole to look into how something can be disabled on a per-OS basis. Meeting consensus was to look into disabling device plugin manager that’s not used/tested on Windows
*   [derekwaynecarr] Kubelet in userns
    *   https://github.com/kubernetes/kubernetes/pull/78635
    *   Should we merge this PR or take a larger design?
*   PodOverhead
    *   API review completed, PR approved but not merged
    *   Moving to 1.16
*   RuntimeClass Scheduler
    *   API implementation approved, PR’s not in
    *   Moving to 1.16
*   TerminationPeriod: https://github.com/kubernetes/kubernetes/issues/77873
    *   Yuju: asked to understand use case more, may have other options to do it
    *   Derek - the Pod API already captures the user intent here, and it not being honored at shutdown could catch them by surprise
    *   


# May 28



*   [Extend NPD to support metrics](https://docs.google.com/document/d/1SeaUz6kBavI283Dq8GBpoEUDrHA2a795xtw0OvjM568/edit). (@xueweiz)
*   Issue Triage Process
    *   Document for discussion (requires membership in kubernetes-sig-node google group) https://docs.google.com/document/d/1JCN0lf9svebU2RTjCnz_cGnCrC4r5Sysb-ucdu1MLnA/edit#
*   Topology Manager PR Review and status update [@lmdaly]
    *   https://github.com/kubernetes/kubernetes/issues/72828


# May 21



*   Proposed to cancel meeting due to KubeCon EU


# May 14



*   Follow-up review to [In-Place Vertical Scaling KEP](https://github.com/kubernetes/enhancements/pull/686) after last week discussion.
    *   Identify any items that may need to be addressed to get KEP approved.
    *   @vinaykul, @derekwaynecarr @dashpole @dawnchen
*   Do we want to have dedicated meetings for issue triage?  (@derekwaynecarr)


# May 7



*   Pod Overhead: requests vs limits & QoS - see [this comment](https://github.com/kubernetes/enhancements/issues/688#issuecomment-488824132)
    *   shouldn't affect QoS
    *   BestEffort support should be a policy decision, independent of overhead implementation (e.g. fro Kata containers)
    *   Overhead should still be considered with BestEffort pods (scheduling, running)
    *   
*   Review latest updates to [In-Place Vertical Scaling KEP](https://github.com/kubernetes/enhancements/pull/686) @vinaykul, @DerekCarr @dashpole


# April 30



*   Discuss KEP https://github.com/kubernetes/enhancements/pull/808
    *   owner: khenidak
    *   prerequisite: SIG network owns the feature, should approve first. SIG Node would like to collaborate on the required CRI changes.
*   Graduate 3rd party device monitoring plugins to beta
    *   owner: @renaudwastaken and @dashpole
    *   Feature introduced in 1.13
    *   Will present a demo of the gpu-exporter
    *   NVIDIA GPU Exporter: https://github.com/NVIDIA/gpu-monitoring-tools/tree/master/exporters/prometheus-dcgm/k8s/pod-gpu-metrics-exporter
    *   Enhancement: https://github.com/kubernetes/enhancements/issues/606
    *   E2e testing: https://github.com/kubernetes/kubernetes/blob/master/test/e2e_node/device_plugin.go#L99
    *   Agreed to promote to beta in 1.15
*   [Yanir Quinn] : Discussion and a presentation (+quick demo) of node eviction controller (server side drain)  - https://github.com/kubevirt/node-maintenance-operator \
project started under KubeVirt. \
https://groups.google.com/d/msg/kubernetes-sig-node/6AFFLjVz8us/g7yDIFVEBwAJ
*   (FYI) cAdvisor APIs deprecation - https://github.com/kubernetes/kubernetes/issues/68522
    *   Suggest to separate cAdvisor endpoints from /summary deprecation. One is formally supported by K8s before, others are never properly supported by us.
*   (short but time critical) - Do we need a SIG-Node approver for https://github.com/kubernetes/enhancements/pull/1000 ?. Based on discussion in [Slack](https://kubernetes.slack.com/archives/C0BP8PW9G/p1556584219050300), should we just approve within SIG-Windows? (@patricklang)
    *   Since implementing CRI, not changing it for this KEP, will remove SIG-Node as approver and keep @yujuhong on as reviewer
*   Graceful timeout issue and CRI changes needed - Mrunal


# Apr 23



*   


# Apr 16



*   Removing cloud provider info from the /spec endpoint - [#76291](https://github.com/kubernetes/kubernetes/pull/76291)
    *   More generally: should we deprecate the kubelet endpoints tied to cadvisor? Candidates include: spec, non-summary stats, /metrics/cadvisor
    *   Filed https://github.com/kubernetes/kubernetes/issues/76660 for deprecation
*   Bringing CRI-ContainerD to Windows ([doc](https://docs.google.com/document/d/1NigFz1nxI9XOi6sGblp_1m-rG9Ne6ELUrNO0V_TJqhI/edit#)) (@patricklang)
    *   Background, use cases and some key decision points outlined
    *   Ask: Close on list of reviewers this week so this can move to a KEP
    *   Ask: For the proposals that _require CRI changes_, designate team & process to move forward. KEP or ?
*   Who owns the policy around revendoring the Docker API (see [PR](https://github.com/kubernetes/kubernetes/pull/75843))? Is it SIG-Node? (@patricklang) This broke Windows tests across the board from 4/12 to 4/14 when we set DOCKER_API_VERSION to override it, but could have been prevented with testing ([PR](https://github.com/kubernetes/test-infra/pull/12010) with /test trigger in review). Can we get someone to help push this PR through so /test works and we can prevent this next time?
    *   What about pinning Docker API version so revendoring doesn’t change it? 
*   FYI, [KEP for Ephemeral Containers](https://git.k8s.io/enhancements/keps/sig-node/20190212-ephemeral-containers.md) has moved to implementable. Please chime in with any feedback.


# Apr 09



*   Meeting canceled due to lack of agenda topics
*   Please reach out on slack if blocked


# Apr 02



*   Vertical Scaling KEP: https://github.com/kubernetes/enhancements/pull/686#
    *   @DerekCarr review latest updates, and sign-off if all concerns are addressed.
    *   @PatrickLang review suggested CRI changes for Windows compat
    *   Discuss any other concerns with merging this KEP, and going to next-steps.
*   Critical container KEP: https://github.com/kubernetes/enhancements/pull/912
    *   Please check [Sidecar Kep](https://github.com/kubernetes/enhancements/blob/master/keps/sig-apps/sidecarcontainers.md) to see whether it solves the use case here, see how this compares to https://github.com/kubernetes/enhancements/pull/919
*   Update docker/docker dependency in Kubernetes: https://github.com/kubernetes/kubernetes/pull/75843#issuecomment-478186871


# Mar 26



*   RuntimeClass Scheduling KEP review: (tallclair) https://github.com/kubernetes/enhancements/pull/896 \
https://github.com/kubernetes/enhancements/pull/909
*   PR do discuss : [#71786](https://github.com/kubernetes/kubernetes/pull/71786) importance of admit pod, by sorting the pods based on created timestamp. is it necessary to sort pods to admit ??

        PR which is working fine without the pods sorting [#75715](https://github.com/kubernetes/kubernetes/pull/75715) 


        Google discussion reference [(g-group discussion)](https://groups.google.com/forum/?utm_medium=email&utm_source=footer#!msg/kubernetes-sig-node/9e93aO0D2C8/fQVnMXbbAgAJ)

*   Vertical Scaling follow-up: https://github.com/kubernetes/enhancements/pull/686#
    *   Identify additional reviewer(s): 
    *   Updated KEP review
        *   Revised flow control
        *   Notes on handling Pod Overhead


# Mar 19



*   v1.15 topics to tackle (pair up owners and approvers)
    *   draft:https://docs.google.com/document/d/1Qdba1lM7H5eovFyV5Mp-bXplIWT42FXDRWRDzloH-4s/edit?usp=sharing
*   Vertical Scaling KEP review: https://github.com/kubernetes/enhancements/pull/686
    *   Outstanding issues: memory reduction, memory backed emptyDir, backward compat
*   RuntimeClass Scheduling KEP review: https://github.com/kubernetes/enhancements/pull/896


# Mar 12th 

Cancelled


# Mar 5th



*   Add [maxInitialFailureCount](https://github.com/matthyx/enhancements/blob/master/keps/sig-node/20190221-maxInitialFailureCount-health-probes.md) to health probes (@matthyx)
    *   target for v1.15
    *   Next Step: find reviewers from sig-node for this KEP 
*   NUMA Manager: https://github.com/kubernetes/enhancements/issues/693#issuecomment-466728227 
    *   Code Tracking Issue here: https://github.com/kubernetes/kubernetes/issues/72828
    *   since the code freeze for v1.14 is coming in two days, this feature should target for v1.15.
    *   Next Step: update kep to reflect the delay
*   RuntimeClass beta update [@tallclair] - Summary of changes requested in API review & implications for upgrades.
    *   move RuntimeClass API from CRD to a core API, since CRD is not fully ready yet; previously existing RuntimeClass objects will need to be created;
    *   rename `runtime_handler` to `handler`, and make the `handler` field as required; this only affects RuntimeClass objects; the RuntimeClassName field of PodSpec can still be left empty;
    *   node e2e tests will be added for beta; no conformance tests will be added for now;
*   do we currently track the review effort from the sig-node side for the sig-windows PRs for v1.14 (@Patrick)?
    *   currently, we don’t. The process for v.14 is very fluid. Please ping sig-node if help is needed.
    *   We will improve this for v1.15
*   Runc memory issue: https://github.com/opencontainers/runc/issues/1980 
    *   Fix under review: https://github.com/opencontainers/runc/pull/1984
    *   Basically, instead of copying the runc binary into memory or `/tmp`, it creates a temporary read-only bind mount into runc state directory to avoid extra memory usage. 
    *   The fix is still under review.
    *   


# Feb 26th



*   [Separating a CRI for docker from Kubelet](https://groups.google.com/d/msg/kubernetes-sig-node/0qVzfugYhro/l6Au216XAgAJ) (@dims)
    *   Previous SIG Node decision: container runtime is part of the os distro and node image. In the future, the container runtime in the test infra is provided and supported by the os distro and node image vendors. (@DawnChen)
    *   There is no rush to make decision on this since many productions are still depending on DockerShim even both cri-containerd and cri-o are productionized. But it is worthy talking about the current status and the goal. (@DawnChen)
    *   Sig-windows wants to move to cri-containerd as fast as possible. Some features only exist in cri-containerd, and hard to add into dockershim, e.g. some RuntimeClass features. (@Patrick)
    *   It is not the time yet to make the decision, we probably need another year. (@Derek)
    *   We already started adding features not supported by dockershim, and there will be more, e.g. secure pod, runtime class. At least if people agree on that we are going to eventually deprecate dockershim, we can continue adding this kind of features. (@yujuhong)
    *   Looking at about a year deprecation clock, once blockers are satisfied.
    *   We can start thinking about and document dockershim deprecation criteria. That doesn’t need to wait until the clock timer starts. (@yujuhong)
    *   Would really like to see this in a KEP showing how it lines up with graduating RuntimeClass, getting CRI to 1.0, and giving time for other runtimes to catch up that should be a well communicated part of sig-node roadmap (@Patrick)
    *   Who will be the advocate for when we know this is the right thing to do?
    *   Who can drive the KEP? @resouer volunteered to write a KEP for this. (@DawnChen)
    *   Next Step: we will come back to this topic one month after the KEP is sent to the community. (@DawnChen)
*   Follow up discussion on [pod resource overhead issue](https://github.com/kubernetes/enhancements/issues/688)/[RFC doc](https://docs.google.com/document/d/1EJKT4gyl58-kzt2bnwkv08MIUZ6lkDpXcxkHqCvvAp4/edit#heading=h.b24dqducgii8) (@egernst)
    *   overview [presentation](https://docs.google.com/presentation/d/1TNzmWcFMgUsdc59oAPeV_50RVrhal7qSI17FPRsZ7bU/edit#slide=id.g4cee2d5f0f_0_90) 
    *   introduce a pod overhead to the PodSpec, which will be taken into account along with the container requests.  This will be populated automatically by an admission controller, which utilizes the values from RuntimeClass CRD.  Would like to intercept Kubernetes 1.15 as a separate feature.
    *   Why not just add pod level resource limit/requests? (@Derek)
    *   Next step: continue the discussion on the KEP
*   Warning / Announcement runc memory spike issue after the CVE fix, pod with low memory limit (<10mb) may not run anymore https://github.com/opencontainers/runc/issues/1980. (@DawnChen)


# Feb 19th



*   [Promoting cloud provider node labels to GA](https://github.com/kubernetes/enhancements/pull/839) (@andrewsykim)
    *   Approved by SIG Node
*   Deprecate “containerized” kubelet - [#74148](https://github.com/kubernetes/kubernetes/issues/74148) (@dims)
    *   Yes from SIG Node
    *   Only change how to run Kubelet for HyperKube, not deprecate HyperKube.
    *   We should announcing this to kubernetes-dev@ and Kubernetes Community meeting


# Feb 12th



*   Discuss [Sidecar KEP](https://github.com/kubernetes/enhancements/issues/753) (@jirving)


# Feb 5th



*   Discuss [Sidecar KEP](https://github.com/kubernetes/enhancements/issues/753) (@jirving)
    *   Add implementation details to KEP
*   Issue [#73707](https://github.com/kubernetes/kubernetes/issues/73707): Include RuntimeClass information in [PodSandbox](https://github.com/kubernetes/kubernetes/blob/f52713515b8d526feed0f9111b3f075aaf463001/pkg/kubelet/apis/cri/runtime/v1alpha2/api.proto#L480) and [PodSandboxStatus](https://github.com/kubernetes/kubernetes/blob/f52713515b8d526feed0f9111b3f075aaf463001/pkg/kubelet/apis/cri/runtime/v1alpha2/api.proto#L422) (haiyanmeng@ and tallclair@)
*   UserNS remapping: [updated proposal](https://github.com/kubernetes/community/pull/2595) (vikasc)
*   Discuss `oom_score_adj` based, in part, on pod priority (seth)
*   Add pod name and namespace in the CRI container log path (lantaol@) [#73503](https://github.com/kubernetes/kubernetes/issues/73503)
*   NodeAllocatablePIDLimits (@rkrawitz)
    *   WIP https://github.com/kubernetes/kubernetes/pull/73651


# Jan 29



*   Discuss [Sidecar Kep](https://github.com/kubernetes/enhancements/blob/master/keps/sig-apps/sidecarcontainers.md),[ (initial discussion PR](https://github.com/kubernetes/community/pull/2148)) - API implementation in particular needs to be decided (@jirving, @enisoc)
    *   Tracking [issue opened](https://github.com/kubernetes/enhancements/issues/753)
    *   Discuss again at next week’s meeting
    *   @jirving to investigate how wide reaching the kubelet changes will be
*   Discuss [Kubelet Resource Metrics Endpoint KEP](https://github.com/kubernetes/enhancements/pull/726) (dashpole@) [Slides](https://docs.google.com/presentation/d/14zM8S7Ftymo3OabGc208EIjLCXpDheA8yjVV7hWUr2M/edit?usp=sharing)
*   Discuss/review Kubelet and CRI portions of [Windows GMSA KEP](https://github.com/kubernetes/enhancements/blob/master/keps/sig-windows/20181221-windows-group-managed-service-accounts-for-container-identity.md) [jean, ddebroy, jeremy]. Specifically need two questions for SIG Node clarified at to reach “implementable” status: https://github.com/kubernetes/enhancements/pull/710#issuecomment-457745480:
    *   Is the proposal in the KEP to add (alpha, feature-gated) code in kubelet/dockershim to drive CRI behavior from the pod annotation considered acceptable?
    *   Is there a goal to reconcile the capabilities of the pod API, the CRI API, and the OCI spec? if so, has there been discussion about what that would look like (and if what this KEP proposes looks like it could align with that)?
*   Status Note: Windows stable graduation criteria are also in a KEP [743](https://github.com/kubernetes/enhancements/pull/743) which is in final review to be marked implementable for 1.14. Yu-ju & Dawn Reviewing, already have multiple rounds of updates made based on feedback from Brian Grant & Yu-ju.
*   Report usageNanoCores for CRI runtimes (PatrickLang@) https://github.com/kubernetes/kubernetes/issues/72803 https://github.com/kubernetes/kubernetes/issues/72788
*   Minor: Consider deprecating the --register-node flag, and just use --kubeconfig flag as the signal to register or not: https://github.com/kubernetes/kubernetes/issues/61656 (@mtaufen)
*   HugePages KEP / feature issue: https://github.com/kubernetes/enhancements/issues/751 (@derekwaynecarr)


# Jan 22



*   RuntimeClass v1.14 plans
    *   RuntimeClass to Beta - requirements? https://github.com/kubernetes/enhancements/pull/697
    *   [Revisit upgrade story](https://docs.google.com/document/d/1hH99thfjpVDG77GgBUT0yXtHb1u8E0zcT_kviwjG1k8/edit?usp=sharing)
*   Review https://github.com/kubernetes/enhancements/pull/686 ( @vinaykul )
    *   Discuss memory reduction, emptyDir
    *   Any other major concerns
*   NodeSelectors - is this a practice SIG-Node recommends?
    *   “kubelet: promote OS & arch labels to GA” merged https://github.com/kubernetes/kubernetes/pull/73048 
    *   PR asking to constrain CoreDNS to Linux nodes https://github.com/kubernetes/kubernetes/pull/69940 


# Jan 15



*   UserNS remapping: [updated proposal](https://github.com/kubernetes/community/pull/2595),[ implementation PR](https://github.com/kubernetes/kubernetes/pull/64005) and  [Demo](https://www.youtube.com/watch?v=2sEmceRNa6Y) (vikasc)
*   PLEG relist has a race with event channel: [#72482](https://github.com/kubernetes/kubernetes/issues/72482) ,WIP PR: [#72709](https://github.com/kubernetes/kubernetes/pull/72709) (@resouer)
*   lts discussion https://github.com/kubernetes/community/pull/2911 (tpepper)
    *   Plan to formalize the workgroup
    *   Sig Node is one of stakeholders 
*   v1.14 release team checkin (spiffxp)
    *   If possible can we run through this in first 30 mins? sched conflict afterwards
    *   I’m here in lieu of Claire Laurence, v1.14 Enhancements Lead
    *   **Enhancement Freeze Jan 29**
    *   All kubernetes/enhancements issues targeted for v1.14 must have a KEP, even if they didn’t before
    *   KEP graduation criteria should include a checklist of requirements for alpha/beta/stable, including test plan and upgrade/downgrade plan
    *   Review of [kubernetes/enhancements issues targeted for v1.13](https://github.com/kubernetes/enhancements/issues?utf8=%E2%9C%93&q=is%3Aissue+is%3Aopen+milestone%3Av1.13+label%3Asig%2Fnode), what needs to be moved to v1.14, what can be closed?
        *   Dawn: Done. Re-targeted some to v1.14, and closed others. 
    *   Review of [kubernetes/enhancements issues targeted for v1.14](https://github.com/kubernetes/enhancements/issues?utf8=%E2%9C%93&q=is%3Aissue+is%3Aopen+milestone%3Av1.14+label%3Asig%2Fnode+), are these accurate?
        *   Will file the rest of features. 
*   Graduate HugePages to GA, any objections? (@derekwaynecarr)
    *   https://github.com/kubernetes/kubernetes/pull/72785
*   ReplicaSet controller continuously creating pods failing due to SysctlForbidden (@Suraj) [#kubernetes/72593](https://github.com/kubernetes/kubernetes/issues/72593)
    *   ReplicaSet controller should know about the pod failure
    *   Controllers should be smarter to handle these errors and backoff
    *   If an user is using sysctl then it is assumed they are breaking the containers and pod boundaries that kubernetes endorses
    *   Ideal to solve it at the controller level than at the kubelet level
*   Initial review of PR https://github.com/kubernetes/enhancements/pull/686 (@vinaykul)


# Jan 08



*   Pulls of note
    *   Remove deprecated AllowPrivileged, HostNetworkSources, etc. options - https://github.com/kubernetes/kubernetes/pull/71835 (@tallclair, @charrywanganthony)
    *   Inconsistent termination message output https://github.com/kubernetes/kubernetes/pull/71416 (@pontiyaraja)  [google group post](https://groups.google.com/forum/?utm_medium=email&utm_source=footer#!msg/kubernetes-sig-node/wQhDyyRAV2U/pOwY0Ql5FQAJ)
    *   Promote `ValidateProxyRedirects` to Beta and enable by default: https://github.com/kubernetes/kubernetes/pull/72552 (@tallclair)
*   GMSA support for Windows: https://github.com/kubernetes/enhancements/pull/666 (@jeremywx, @jean, and @ddebroy)
*   UserNS remapping: [updated proposal](https://github.com/kubernetes/community/pull/2595),[ implementation PR](https://github.com/kubernetes/kubernetes/pull/64005) and  [Demo](https://www.youtube.com/watch?v=2sEmceRNa6Y) (vikasc)
*   Requesting review on pull of in-place update of Pod resources: https://github.com/kubernetes/community/pull/2908/commits/4ad6fa7c27f4a21c27a6be83c2dc81c43549fa55