Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

breaking: Make StepDownOnRemoval the default behavior #239

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

soma00333
Copy link

@soma00333 soma00333 commented Nov 18, 2024

Summary:

This PR addresses issue #83 and is part of the v4.0.0 milestone.

The StepDownOnRemoval feature, introduced in PR #79, ensures that a leader steps down to a follower role after it removes itself from the group or is demoted to a learner. Without this feature, the former leader may continue sending heartbeats despite no longer being part of the group, which could cause inconsistencies.

For backward compatibility, this behavior was initially disabled by default. In version 4.0.0, we aim to make this behavior the default and remove the associated configuration setting to simplify the leadership transition logic.

Key Changes:

  • Removed the configurability of StepDownOnRemoval; the behavior is now always enabled.
  • Updated the relevant tests to reflect the mandatory StepDownOnRemoval behavior.

Breaking Changes:

This is a breaking change for projects relying on the false configuration of StepDownOnRemoval. The leadership transition behavior will now enforce stepping down when a leader removes itself or is demoted, which may require updates to dependent systems or configurations to align with the new behavior.

Related References:

@k8s-ci-robot
Copy link

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: soma00333
Once this PR has been reviewed and has the lgtm label, please assign ahrtr for approval. For more information see the Kubernetes Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot
Copy link

Hi @soma00333. Thanks for your PR.

I'm waiting for a etcd-io member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@soma00333
Copy link
Author

@ahrtr
Hello again,
I handled a ticket in the v4.0.0 milestone.
Once the branch is ready, please review this too.
Thank you.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants