Skip to content

HPA development is not active #128948

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
sanposhiho opened this issue Nov 23, 2024 · 22 comments
Open

HPA development is not active #128948

sanposhiho opened this issue Nov 23, 2024 · 22 comments
Labels
needs-triage Indicates an issue or PR lacks a `triage/foo` label and requires one. sig/autoscaling Categorizes an issue or PR as relevant to SIG Autoscaling.

Comments

@sanposhiho
Copy link
Member

/sig autoscaling
/cc @kubernetes/sig-autoscaling-misc

What

HPA's development has not been active recently.
It causes many PRs to struggle to get reviews, including some KEPs.
Essentially, this is the problem of lacking approvers in HPA.

Context (AFAIK)

Currently, @mwielgus is the only approver, but already left the sig-autoscaling chair, and I'm not sure if they're still willing to help in reviewing.
https://github.com/kubernetes/kubernetes/blob/master/pkg/controller/podautoscaler/OWNERS#L7
I know the step down doesn't always mean a stop working on things, but, in this case, actually the last review from them was more than 1 year ago.
https://github.com/kubernetes/kubernetes/pulls?q=is%3Apr+reviewed-by%3Amwielgus+is%3Aclosed

There are some minor changes made in HPA though, all of them are approved by someone else (root approvers), not stamps from sig-autoscaling.
https://github.com/kubernetes/kubernetes/commits/master/pkg/controller/podautoscaler

Also, @gjtempleton is trying to take over the position, and he's (only) a reviewer (not yet approver) apart from @mwielgus now.

Proposal

We're trapped in a vicious cycle; HPA development is not active because of the lack of reviewers/approvers, and no reviewer is newly born because HPA development is not active.

There's (probably, AFAIK) no other active person who is eligible for the reviewer/approver of HPA based on the official criteria.
But, we shouldn't keep the current situation, and I'd propose having some volunteers to join reviewers/approvers to break through (even if they're not officially eligible).

Regarding the approver, I cannot come up with any idea other than asking @gjtempleton to be an approver and start approving some PRs. (... I know they're also busy though)
Also, when I was doing the container-based HPA enhancement, I remember @pbarker also helped reviewing a lot, might be a good idea to ask them to join the reviewer list. (PRs, reviews) I can also help in being a reviewer too. (PRs, reviews)

@k8s-ci-robot k8s-ci-robot added sig/autoscaling Categorizes an issue or PR as relevant to SIG Autoscaling. needs-triage Indicates an issue or PR lacks a `triage/foo` label and requires one. labels Nov 23, 2024
@k8s-ci-robot
Copy link
Contributor

This issue is currently awaiting triage.

If a SIG or subproject determines this is a relevant issue, they will accept it by applying the triage/accepted label and provide further guidance.

The triage/accepted label can be added by org members by writing /triage accepted in a comment.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@adrianmoisey
Copy link
Member

This problem also applies to the VPA.
Myself (and a small group of others, @omerap12 being one of them) are trying to contribute to the VPA, in order to climb the ranks to become approvers. But it is catch 22, since the current approvers are very busy and can't dedicate much time to review.
For the moment we try review amongst ourselves, getting PRs into a good state. Then we batch up a bunch of PRs and ask the approvers to approve. This is mostly working well, but will take some time before we get to the point where we have more approvers.

I'm happy to turn my attention to the HPA too, but for now all I can offer is code review, no approval.

@omerap12
Copy link
Member

This problem also applies to the VPA. Myself (and a small group of others, @omerap12 being one of them) are trying to contribute to the VPA, in order to climb the ranks to become approvers. But it is catch 22, since the current approvers are very busy and can't dedicate much time to review. For the moment we try review amongst ourselves, getting PRs into a good state. Then we batch up a bunch of PRs and ask the approvers to approve. This is mostly working well, but will take some time before we get to the point where we have more approvers.

I'm happy to turn my attention to the HPA too, but for now all I can offer is code review, no approval.

I agree with the above. I'm also willing to help, but I'm not very familiar with the HPA codebase yet (though I'd like to dive into it).

@DP19
Copy link
Contributor

DP19 commented Nov 25, 2024

I can also volunteer some time here; I've become pretty familiar with the code when comparing it against a GKE issue we ran into here and also working on this bug (that's still waiting to be approved like you've mentioned)

@wzshiming
Copy link
Member

This problem also bothered me, and I tried to push the from/to 0 feature of HPV but didn't get much progress

@soltysh
Copy link
Contributor

soltysh commented Nov 28, 2024

This was brought to my attention as one of the steering members overlooking sig-autoscaling. I've started a conversation with current and past leads to ensure we can move forward and get us all in a situation that will ensure the SIG has the necessary power to approve code changes.

@sftim
Copy link
Contributor

sftim commented Dec 10, 2024

Is this possibly also relevant to SIG ContribEx?

@k8s-triage-robot
Copy link

The Kubernetes project currently lacks enough contributors to adequately respond to all issues.

This bot triages un-triaged issues according to the following rules:

  • After 90d of inactivity, lifecycle/stale is applied
  • After 30d of inactivity since lifecycle/stale was applied, lifecycle/rotten is applied
  • After 30d of inactivity since lifecycle/rotten was applied, the issue is closed

You can:

  • Mark this issue as fresh with /remove-lifecycle stale
  • Close this issue with /close
  • Offer to help out with Issue Triage

Please send feedback to sig-contributor-experience at kubernetes/community.

/lifecycle stale

@k8s-ci-robot k8s-ci-robot added the lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. label Mar 10, 2025
@sftim
Copy link
Contributor

sftim commented Mar 10, 2025

Myself (and a small group of others, @omerap12 being one of them) are trying to contribute to the VPA, in order to climb the ranks to become approvers. But it is catch 22, since the current approvers are very busy and can't dedicate much time to review.

BTW, SIGs can choose to treat opening of reasonable-looking PRs as grounds to accept a new reviewer.

Reviewers should try to make sure that the queue of ready-to-approve PRs is tidy and that only PRs genuinely ready for approval reach that stage.

@k8s-triage-robot
Copy link

The Kubernetes project currently lacks enough active contributors to adequately respond to all issues.

This bot triages un-triaged issues according to the following rules:

  • After 90d of inactivity, lifecycle/stale is applied
  • After 30d of inactivity since lifecycle/stale was applied, lifecycle/rotten is applied
  • After 30d of inactivity since lifecycle/rotten was applied, the issue is closed

You can:

  • Mark this issue as fresh with /remove-lifecycle rotten
  • Close this issue with /close
  • Offer to help out with Issue Triage

Please send feedback to sig-contributor-experience at kubernetes/community.

/lifecycle rotten

@k8s-ci-robot k8s-ci-robot added lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed. and removed lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. labels Apr 9, 2025
@towca
Copy link
Contributor

towca commented Apr 10, 2025

/remove-lifecycle rotten

@k8s-ci-robot k8s-ci-robot removed the lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed. label Apr 10, 2025
@BenTheElder
Copy link
Member

@soltysh we should check in again here.

I agree that people can sign up for reviewer immediately. Reviewer is a way to help be assigned initial reviews before approvers and gain knowledge. If anyone is interested that is a great starting point.

@raywainman
Copy link

I wonder if we can close this now?

With kubernetes/org#5503 just waiting for code freeze to lift before submission we will now have more reviewers + owners in place here.

We've also made a few contributions to HPA in the last little while, for example the tolerance feature that went out in 1.33. I expect momentum to ramp up here.

cc @jackfrancis @gjtempleton @towca

@gjtempleton
Copy link
Member

gjtempleton commented Apr 10, 2025

@raywainman I'd say lets raise the PR to add yourself and @adrianmoisey to the reviewers list under OWNERS as well.

Edit: @omerap12 as well, assuming he's still wanting to join in?

@omerap12
Copy link
Member

@raywainman I'd say lets raise the PR to add yourself and @adrianmoisey to the reviewers list under OWNERS as well.

Edit: @omerap12 as well, assuming he's still wanting to join in?

Count me in :)

@towca
Copy link
Contributor

towca commented Apr 11, 2025

With kubernetes/org#5503 just waiting for code freeze to lift before submission we will now have more reviewers + owners in place here.

Are we sure that this will result in a meaningful increase to PR reviewing bandwidth for HPA approvers? I talked to @adrianmoisey about this during KubeCon, and IIUC (please correct me if I got it wrong Adrian) he had trouble finding approvers for HPA PRs fairly recently.

@adrianmoisey
Copy link
Member

With kubernetes/org#5503 just waiting for code freeze to lift before submission we will now have more reviewers + owners in place here.

Are we sure that this will result in a meaningful increase to PR reviewing bandwidth for HPA approvers? I talked to @adrianmoisey about this during KubeCon, and IIUC (please correct me if I got it wrong Adrian) he had trouble finding approvers for HPA PRs fairly recently.

That is correct, however, this issue (and the suggestions in it) is the path forward to getting approvers (over time)

@sanposhiho
Copy link
Member Author

sanposhiho commented Apr 11, 2025

@gjtempleton can't we also promote you to the approver now? I know increasing the number of reviewers is a good starting point from a long-term perspective, but it's not an immediate solution since, either way, PRs would end up getting stuck at getting /approve, like now. And, I'm not sure if someone could be an approver officially (i.e., with the official approver criteria) in that situation.

@towca
Copy link
Contributor

towca commented Apr 11, 2025

With kubernetes/org#5503 just waiting for code freeze to lift before submission we will now have more reviewers + owners in place here.

Are we sure that this will result in a meaningful increase to PR reviewing bandwidth for HPA approvers? I talked to @adrianmoisey about this during KubeCon, and IIUC (please correct me if I got it wrong Adrian) he had trouble finding approvers for HPA PRs fairly recently.

That is correct, however, this issue (and the suggestions in it) is the path forward to getting approvers (over time)

Understood, in this case I'd keep the issue open until the situation improves (and e.g. we have 2 active HPA approvers). @raywainman WDYT?

@soltysh
Copy link
Contributor

soltysh commented Apr 14, 2025

@soltysh we should check in again here.

I agree that people can sign up for reviewer immediately. Reviewer is a way to help be assigned initial reviews before approvers and gain knowledge. If anyone is interested that is a great starting point.

During KubeCon EU I've talked with several people who are working on progressing through the contributor ladder, and I'm actively in contact with them. It's moving forward, although it will take a few more weeks, maybe even months 🤞

With kubernetes/org#5503 just waiting for code freeze to lift before submission we will now have more reviewers + owners in place here.

This changes leads, which is parallel effort. I don't have any objections to closing this issue. Like I wrote above work is happening and I'm personally involved in helping sig-autoscaling earn the approver rights in hpa.

Are we sure that this will result in a meaningful increase to PR reviewing bandwidth for HPA approvers? I talked to @adrianmoisey about this during KubeCon, and IIUC (please correct me if I got it wrong Adrian) he had trouble finding approvers for HPA PRs fairly recently.

As mentioned before the newly appointed leads are in-sync with me, so every PR they approve is then sent over to me for actual approval label. This way they are earning the necessary confidence to become approvers. I might have talked with Adrian during KubeCon, b/c I clearly remember talking with someone from South Africa 😅 but that might have been someone else.

@raywainman
Copy link

Understood, in this case I'd keep the issue open until the situation improves (and e.g. we have 2 active HPA approvers). @raywainman WDYT?

I'm good with that!

I've opened #131292 here to refresh the reviewers/approvers list. Please chime-in on that PR if I've missed anything.

Thanks all!

@adrianmoisey
Copy link
Member

As mentioned before the newly appointed leads are in-sync with me, so every PR they approve is then sent over to me for actual approval label. This way they are earning the necessary confidence to become approvers. I might have talked with Adrian during KubeCon, b/c I clearly remember talking with someone from South Africa 😅 but that might have been someone else.

Yup, that was me :)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
needs-triage Indicates an issue or PR lacks a `triage/foo` label and requires one. sig/autoscaling Categorizes an issue or PR as relevant to SIG Autoscaling.
Projects
None yet
Development

No branches or pull requests