-
Notifications
You must be signed in to change notification settings - Fork 28.9k
[SPARK-28921][BUILD][K8S][2.4] Update kubernetes client to 4.4.2 #25641
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
Test build #4849 has finished for PR 25641 at commit
|
|
When I run I could use some guidance on how to apply this patch to the 2.4 branch. |
|
According to your error message, are you running it in JDK11? We need to do this in JDK8.
Apache Spark 2.x doesn't support JDK11 yet. |
|
Retest this please. |
|
Kubernetes integration test starting |
|
Kubernetes integration test status success |
|
Test build #109997 has finished for PR 25641 at commit
|
|
This PR is tested with |
### What changes were proposed in this pull request? Upgrade kubernetes client from 4.1.2 to 4.4.2 ### Why are the changes needed? To fix compatibility issue with EKS since Amazon rolled out some security patches over the past week; 1.15.3, 1.14.6, 1.13.10, 1.12.10, and 1.11.10. ### Does this PR introduce any user-facing change? No ### How was this patch tested? Manual testing Closes #25641 from andygrove/SPARK-28921-2.4. Authored-by: Andy Grove <[email protected]> Signed-off-by: Dongjoon Hyun <[email protected]>
### What changes were proposed in this pull request? Upgrade kubernetes client from 4.1.2 to 4.4.2 ### Why are the changes needed? To fix compatibility issue with EKS since Amazon rolled out some security patches over the past week; 1.15.3, 1.14.6, 1.13.10, 1.12.10, and 1.11.10. ### Does this PR introduce any user-facing change? No ### How was this patch tested? Manual testing Closes apache#25641 from andygrove/SPARK-28921-2.4. Authored-by: Andy Grove <[email protected]> Signed-off-by: Dongjoon Hyun <[email protected]> (cherry picked from commit 446ffb1)
|
Spark on all platform version are affected. Does it mean we have a spark version available to handle this issue? Looks like we have to build our own spark to use? |
|
@Jeffwan . I'm wondering how you are using EKS now. Since you works for AWS, I think you know it better than me. 😄 |
|
@dongjoon-hyun Thanks for coming back to me. Most of the users I think they download spark from official website (https://spark.apache.org/downloads.html. ) and build image from pre-built binaries. In this case, it's not working.. I am just curious the PATCH version release cycle. How does community determine if we need to release a new patch version? |
|
@Jeffwan . First of all, could you tell me if EKS provides a fallback option (to launch the previous working EKS 1.13.x versions) for that outage? If not, I'm very sorry about that because I'm one of the EKS customers. For the outage you mentioned, I believe you know that the other K8s users (including AWS customers who are using their own K8s services) with old K8s versions are not suffering from this. There are many users with various environments unlikely managed EKS. Given that, the above production outage from EKS environment may be considered as a hidden pitfall of managed service providers due to lack of the downstream testing (or lack of consideration on customer use cases). More importantly, you should not assume that customers always live on the latest Spark releases. In the customer production environments, there are many used versions simultaneously; 2.3.0, 2.3.1, 2.3.2, 2.3.3, 2.3.4 (the last EOL release), 2.4.0, 2.4.1, 2.4.2, 2.4.3, 2.4.4. So, new release cannot recover all production-down issues because old version' users have their reasons to stick to that. This is the reason why I think EKS had better provide a fallback option. That will be a better way to support all the customers. You may recommend to upgrade Apache Spark versions, but what will happen if this kind of outages happens again and again frequently? We have many downstreams like EKS. As you know, technically, Apache Spark community didn't make a decision to break the customer production environments like this. Lastly, Apache Spark community is an independent community which has own release cycle and |
|
As @andygrove mentioned the original PR on
|
### What changes were proposed in this pull request? Upgrade kubernetes client from 4.1.2 to 4.4.2 ### Why are the changes needed? To fix compatibility issue with EKS since Amazon rolled out some security patches over the past week; 1.15.3, 1.14.6, 1.13.10, 1.12.10, and 1.11.10. ### Does this PR introduce any user-facing change? No ### How was this patch tested? Manual testing Closes apache#25641 from andygrove/SPARK-28921-2.4. Authored-by: Andy Grove <[email protected]> Signed-off-by: Dongjoon Hyun <[email protected]>
|
@dongjoon-hyun Yes.. This is the first time we do fallback for some customers. If there's a big impact on customer's business, we help fallback specific clusters.. We know users complain jenkins or spark which depends on fabric k8s SDK not working after CVE patch.. Thanks a lot for the details. Totally understand it's just related to some managed services like EKS. I am trying to understand more on the release and we can take quick actions with reasonable mitigation options in the future. |
|
Thank you for your understanding, @Jeffwan . I know you guys have own Spark versions, but we want to collaborate you guys more before the customers' production-down happens. The current situation is not good for all of us. If you are interested,
|
I am still new to the community, could I know where I can participate the RC vote? I'd love to attend community meeting.
This would be great! I will try to setup it up and detect the problem earlier as we can. Thanks for the suggestion and I will go check docs to see how to make it. |
|
Thank you so much, @Jeffwan . In Apache project community, everything should be processed on mailing list. That is the only official channel for vote, too. So, you need to subscribe
You can browse the old emails via https://lists.apache.org/[email protected] . Please see the emails with the titles starting For the general contribution guide, please see https://spark.apache.org/contributing.html . |
|
@dongjoon-hyun This is great! Thank you so much. We will get involved in the community and make more contributions then. |
### What changes were proposed in this pull request? Upgrade kubernetes client from 4.1.2 to 4.4.2 ### Why are the changes needed? To fix compatibility issue with EKS since Amazon rolled out some security patches over the past week; 1.15.3, 1.14.6, 1.13.10, 1.12.10, and 1.11.10. ### Does this PR introduce any user-facing change? No ### How was this patch tested? Manual testing Closes apache#25641 from andygrove/SPARK-28921-2.4. Authored-by: Andy Grove <[email protected]> Signed-off-by: Dongjoon Hyun <[email protected]>
### What changes were proposed in this pull request? Upgrade kubernetes client from 4.1.2 to 4.4.2 ### Why are the changes needed? To fix compatibility issue with EKS since Amazon rolled out some security patches over the past week; 1.15.3, 1.14.6, 1.13.10, 1.12.10, and 1.11.10. ### Does this PR introduce any user-facing change? No ### How was this patch tested? Manual testing Closes apache#25641 from andygrove/SPARK-28921-2.4. Authored-by: Andy Grove <[email protected]> Signed-off-by: Dongjoon Hyun <[email protected]> (cherry picked from commit 446ffb1)
### What changes were proposed in this pull request? Upgrade kubernetes client from 4.1.2 to 4.4.2 ### Why are the changes needed? To fix compatibility issue with EKS since Amazon rolled out some security patches over the past week; 1.15.3, 1.14.6, 1.13.10, 1.12.10, and 1.11.10. ### Does this PR introduce any user-facing change? No ### How was this patch tested? Manual testing Closes apache#25641 from andygrove/SPARK-28921-2.4. Authored-by: Andy Grove <[email protected]> Signed-off-by: Dongjoon Hyun <[email protected]>
### What changes were proposed in this pull request? Upgrade kubernetes client from 4.1.2 to 4.4.2 ### Why are the changes needed? To fix compatibility issue with EKS since Amazon rolled out some security patches over the past week; 1.15.3, 1.14.6, 1.13.10, 1.12.10, and 1.11.10. ### Does this PR introduce any user-facing change? No ### How was this patch tested? Manual testing Closes apache#25641 from andygrove/SPARK-28921-2.4. Authored-by: Andy Grove <[email protected]> Signed-off-by: Dongjoon Hyun <[email protected]>
|
@dongjoon-hyun do you know yet when |
|
Hi, @HarryWeppner . |
|
@dongjoon-hyun I had seen https://spark.apache.org/versioning-policy.html, which states that
This is really critical as cloud providers upgraded their K8s versions and there is no released Spark version that works! |
|
@HarryWeppner . Can you make a promise that that provider doesn't break anything in the next month again? Are you going to ask Apache Spark releases whenever one of the cloud provider doesn't care about their customers? Sadly, I'm also one of the customer of that vendor, so I understand why you are frustrated. However, as you know, Apache Spark didn't break anything there. You had better file an issue on that company if it breaks something without providing fallbacks.
In addition, please see the above discussion here. There is an efforts to try collaboration to reduce the chance of this kind of surprises which no one wants. That's the best effort the Apache Spark community can do. We works voluntarily and willing for the community. Not for that company. |
|
One more thing. This PR is already superseded by #26152 (Bump K8S client version to 4.6.1) 5 days ago. I guess you want that PR instead of this already :) |
|
@dongjoon-hyun point well taken - it would still be very valuable to know about an approximate timeline for a 2.4.5 maintenance release. Thanks! |
|
Until now, there is no plan. However, according to https://spark.apache.org/news, we can guess like the following.
3.0.0 RC1 also have the similar ETA (https://spark.apache.org/versioning-policy.html). I believe you will have 3.0.0 and 2.4.5 together at least early 2020. BTW, |
|
Fyi, there is a relatively simple workaround a colleague found, which is to explicitly add port |
|
Thank you for sharing the workaround, @HarryWeppner ! |
|
Hi, All. |
can you give us more specifis around this solution? where do we need to change exactly ? |
What changes were proposed in this pull request?
Upgrade kubernetes client from 4.1.2 to 4.4.2
Why are the changes needed?
To fix compatibility issue with EKS since Amazon rolled out some security patches over the past week; 1.15.3, 1.14.6, 1.13.10, 1.12.10, and 1.11.10.
Does this PR introduce any user-facing change?
No
How was this patch tested?
Manual testing