Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update 8.0 breaking change template to gather information on how to programmatically detect it #82905

Merged

Conversation

cjcenizal
Copy link
Contributor

No description provided.

@cjcenizal cjcenizal added v8.0.0 release_note:skip Skip the PR/issue when compiling release notes backport:skip This commit does not require backporting labels Nov 6, 2020
@cjcenizal cjcenizal requested a review from kobelb November 6, 2020 23:52
@@ -30,6 +30,8 @@ requesting the breaking change to be surfaced in the Upgrade Assistant.
<!-- e.g. Based on telemetry data, roughly 75% of our users will need to make changes to x. -->
<!-- e.g. A majority of users will need to make changes to x. -->

**How can we programmatically determine whether the cluster is affected by this breaking change?**
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Were you just looking for the pseudo-code? Is my understanding correct that this isn't just for KIbana-specific deprecations?

Copy link
Contributor Author

@cjcenizal cjcenizal Nov 9, 2020

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Were you just looking for the pseudo-code?

Pseudo-code is an option if that's the best way to communicate how this will be done, or it could just be a plain-speech description of what APIs, settings, entities, etc need to be examined and how they'd be accessed. Does that make sense? Should I clarify this in the template?

Is my understanding correct that this isn't just for KIbana-specific deprecations?

Correct, this is for any deprecation of any component of the Stack. So when I refer to "cluster" I guess I'm really referring to the cluster and any client that interacts with it. Is that what spurred your question?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I was trying to think through what this section would look like for the different products. This is compounded by the current ambiguity between which deprecations will be surfaced by the "Deprecation Info API" vs the "Deprecation logs".

For Elasticsearch deprecations, we won't need any code written in Kibana to detect whether or not a deprecation is currently being violated, Kibana will just be consuming ES's deprecation info API and deprecation logs to make this determination.

For Kibana deprecations, we haven't exposed any core APIs to implement the equivalent of the deprecation info API , or the deprecation logs, but assuming we do, we will require the team that is responsible for the deprecation to write the code to detect it.

And for the other products, we're in a similar position where Kibana needs to consume either their deprecation Info APIs, or their deprecation logs.

So it's not immediately obvious to me why we'd be making the author of the GitHub issue fill out this section.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Got it! In many cases people are already providing details on how you'd determine if the breaking change is in effect. For example, #82578 notes that you'd check the xpack.security.audit.enabled setting. However, this info is mixed in with the "What can users do to address the change manually?" section. By separating it out, I'm hoping to make it easier to categorize the different ways people can check for the presence of the breaking change, which will affect design and implementation. I think this will also make it easier to tell that we're a missing component like a Kibana deprecation info API.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Fair enough. I agree that it helps with the Kibana-specific deprecations.

@cjcenizal cjcenizal merged commit 729631a into elastic:master Nov 9, 2020
@cjcenizal cjcenizal deleted the chore/8.0-breaking-change-check branch November 9, 2020 19:57
gmmorris added a commit to gmmorris/kibana that referenced this pull request Nov 10, 2020
* master: (39 commits)
  Fix ilm navigation (elastic#81664)
  [Lens] Distinct icons for XY and pie chart value labels toolbar (elastic#82927)
  [data.search.aggs] Throw an error when trying to create an agg type that doesn't exist. (elastic#81509)
  Index patterns api - load field list on server (elastic#82629)
  New events resolver (elastic#82170)
  [App Search] Misc naming tech debt (elastic#82770)
  load empty_kibana in test to have clean starting point (elastic#82772)
  Remove data <--> expressions circular dependencies. (elastic#82685)
  Update 8.0 breaking change template to gather information on how to programmatically detect it. (elastic#82905)
  Add alerting as codeowners to related documentation folder (elastic#82777)
  Add captions to user and space grid pages (elastic#82713)
  add alternate path for x-pack/Cloud test for Lens (elastic#82634)
  Uses asCurrentUser in getClusterUuid (elastic#82908)
  [Alerting][Connectors] Add new executor subaction to get 3rd party case fields (elastic#82519)
  Fix test import objects (elastic#82767)
  [ML] Add option for anomaly charts for metric detector should plot min, mean or max as appropriate (elastic#81662)
  Update alert type selection layout to rows instead of grid (elastic#73665)
  Prevent Kerberos and PKI providers from initiating a new session for unauthenticated XHR/API requests. (elastic#82817)
  Update grunt and related packages (elastic#79327)
  Allow the repository to search across all namespaces (elastic#82863)
  ...
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
backport:skip This commit does not require backporting release_note:skip Skip the PR/issue when compiling release notes v8.0.0
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants