-
Notifications
You must be signed in to change notification settings - Fork 1.5k
Separate kubectl user preferences from cluster configs #3104
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/milestone v1.25 |
Hello @eddiezane 👋, 1.25 Enhancements team here. Just checking in as we approach enhancements freeze on 18:00 PST on Thursday June 23, 2022. For note, This enhancement is targeting for stage Here's where this enhancement currently stands:
Looks like for this one, we would need to update the following in the open PR #3392:
For note, the status of this enhancement is marked as |
Hello @eddiezane 👋🏿 Just checking in, as we are four days away from the enhancements freeze on Thursday, June 23, 2022 at 18:00 PM PT. Please get the open PR #3392 merged with the suggestions in the previous comment Please note: the current status of the enhancement is |
Hi @eddiezane 👋 Checking in once more as we approach 1.25 code freeze at 01:00 UTC on Wednesday, 3rd August 2022. Please ensure the following items are completed:
There seems to no open or close PR in k/k. However, correct me if I am wrong and enlist the open or merged PRs in the comments. So, that we can mark the enhancement as As always, we are here to help should questions come up. Thanks!! |
Hey @eddiezane 👋 1.25 Release Docs Shadow here. Does this enhancement work planned for 1.25 require any new docs or modification to existing docs? |
Hi @eddiezane 👋 Checking in once more as we approach 1.25 code freeze at 01:00 UTC on Wednesday, 3rd August 2022. Which is in two days Please ensure the following items are completed:
|
Hello 👋, 1.25 Enhancements Lead here. Unfortunately, this enhancement did not meet the code freeze criteria because there are still unmerged k/k code PRs. If you still wish to progress this enhancement in v1.25, please file an exception request. Thank you so much! /milestone clear |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
Hello @ardaguclu 👋, v1.33 Enhancements team here. Just checking in as we approach enhancements freeze on 02:00 UTC Friday 14th February 2025 / 19:00 PDT Thursday 13th February 2025. This enhancement is targeting stage Here's where this enhancement currently stands:
With all the KEP requirements in place and merged into k/enhancements, this enhancement is all good for the upcoming enhancements freeze. 🚀 The status of this enhancement is marked as |
Hello @eddiezane 👋, v1.33 Docs Lead here. Does this enhancement work planned for v1.33 require any new docs or modification to existing docs? If so, please follow the steps here to open a PR against Also, take a look at Documenting for a release to get yourself familiarize with the docs requirement for the release. Thank you! |
Hi @ardaguclu 👋 -- this is Ryota (@rytswd) from the 1.33 Communications Team! For the 1.33 release, we are currently in the process of collecting and curating a list of potential feature blogs, and we'd love for you to consider writing one for your enhancement! As you may be aware, feature blogs are a great way to communicate to users about features which fall into (but not limited to) the following categories:
To opt in to write a feature blog, could you please let us know and open a "Feature Blog placeholder PR" (which can be only a skeleton at first) against the website repository by Wednesday, 5th March, 2025? For more information about writing a blog, please find the blog contribution guidelines 📚 Tip Some timeline to keep in mind:
Note In your placeholder PR, use |
Hey again @ardaguclu 👋, 1.33 Enhancements team here, Just checking in as we approach code freeze at 02:00 UTC Friday 21st March 2025 / 19:00 PDT Thursday 20th March 2025. Here's where this enhancement currently stands:
With all the implementation (code related) PRs merged as per the issue description:
Additionally, please let me know if there are any other PRs in k/k not listed in the description that we should track for this KEP, so that we can maintain accurate status. This enhancement is now marked as |
Hi @ardaguclu 👋, 1.33 Communications Team here again! This is a gentle reminder for the feature blog deadline mentioned above, which is 02:00 UTC Wednesday, 5th March, 2025. To opt in, please let us know and open a Feature Blog placeholder PR against Tip Some timeline to keep in mind:
Note In your placeholder PR, use |
Proposed new user story: As a user I'd like to be warned if my kuberc file is no longer being used after first use. The idea for this is it is very easy to get in the habit of having the protections your kuberc file offers, but if something should happen to it (for example in alpha loading a new shell with the alpha env var no longer set) users may be surprised that kuberc is no longer in use. I suggest that we write an empty lock file (e.g. .kuberc-lck) to the .kube dir to track that the feature was used, and send warnings if the lock file is present but the kuberc file is not, or is not able to be successfully loaded. This will prevent users from mistakenly assuming that they are being protected by kuberc defaults, and can be easily silenced if they no longer wish to use the file, but won't break existing configs unless they have opted in to kuberc by exporting the env var for alpha, or running a command with a kuberc file that they have created. |
Big +1. The first thing I did while demoing at KubeCon EU was open a new shell that didn't have the env exported and accidentally deleted my "prod" namespace. |
Wouldn't this be an issue specific to alpha and can not happen in beta, stable?. |
In beta it will always try to use the file but if something were to happen to the file it will fall back to default behavior, which uncovers all the same old foot guns from before except this time with more surprise since the user is expecting the safety net of the kuberc set defaults. The proposed solution is not perfect because if something were to unexpectedly happen to the kuberc file itself, it is likely that any lock file would also be affected, but I wanted to provide at least some sort of suggestion. Env vars are too ephemeral, trying to add something to the cluster side is too cumbersome, so I settled on a lock file to at least try and help. |
/label lead-opted-in |
Uh oh!
There was an error while loading. Please reload this page.
Enhancement Description
k/enhancements
) update PR(s):k/k
) update PR(s): Introduce kuberc as new flag to customize defaulting and define aliases in kubectl kubernetes#125230k/website
) update PR(s):k/enhancements
) update PR(s): KEP-3104: promote kuberc to beta #5300k/k
) update PR(s):k/website
) update(s):Please keep this description up to date. This will help the Enhancement Team to track the evolution of the enhancement efficiently.
The text was updated successfully, but these errors were encountered: