Hey Luke -- There were some previous discussions on the mailing list about this but looks like we didn't file the ticket https://lists.apache.org/thread/sqsssos1d9whgmo92vdn81n9r5woy1wk
When I asked some of the folks who worked on Kraft about this, they communicated to me that it was intentional to make unclean leader election a manual action. I think that for folks that want to prioritize availability over durability, the aggressive recovery strategy from KIP-966 should be preferable to the old unclean leader election configuration. https://cwiki.apache.org/confluence/display/KAFKA/KIP-966%3A+Eligible+Leader+Replicas#KIP966:EligibleLeaderReplicas-Uncleanrecovery Let me know if we don't think this is sufficient. Justine On Mon, Dec 18, 2023 at 4:39 AM Luke Chen <show...@gmail.com> wrote: > Hi all, > > We found that currently (the latest trunk branch), the unclean leader > election is not supported in KRaft mode. > That is, when users enable `unclean.leader.election.enable` in KRaft mode, > the config won't take effect and just behave like > `unclean.leader.election.enable` is disabled. > KAFKA-12670 <https://issues.apache.org/jira/browse/KAFKA-12670> was opened > for this and is still not resolved. > > I think this is a regression issue in KRaft mode, and we should complete > this missing feature in 3.x release, instead of adding it in 4.0. > Does anyone know what's status for this issue? > > Thanks. > Luke > > > > On Mon, Nov 27, 2023 at 4:38 PM Colin McCabe <cmcc...@apache.org> wrote: > > > On Fri, Nov 24, 2023, at 03:47, Anton Agestam wrote: > > > In your last message you wrote: > > > > > > > But, on the KRaft side, I still maintain that nothing is missing > except > > > > JBOD, which we already have a plan for. > > > > > > But earlier in this thread you mentioned an issue with "torn writes", > > > possibly missing tests, as well as the fact that the recommended method > > of > > > replacing controller nodes is undocumented. Would you mind clarifying > > what > > > your stance is on these three issues? Do you think that they are > > important > > > enablers of upgrade paths or not? > > > > Hi Anton, > > > > There shouldn't be anything blocking controller disk replacement now. > From > > memory (not looking at the code now), we do log recovery on our single > log > > directory every time we start the controller, so it should handle partial > > records there. I do agree that a test would be good, and some > > documentation. I'll probably take a look at that this week if I get some > > time. > > > > > > Well, the line was drawn in KIP-833. If we redraw it, what is to stop > > us > > > > from redrawing it again and again? > > > > > > I'm fairly new to the Kafka community so please forgive me if I'm > missing > > > things that have been said in earlier discussions, but reading up on > that > > > KIP I see it has language like "Note: this timeline is very rough and > > > subject to change." in the section of versions, but it also says "As > > > outlined above, we expect to close these gaps soon" with relation to > the > > > outstanding features. From my perspective this doesn't really look like > > an > > > agreement that dynamic quorum membership changes shall not be a blocker > > for > > > 4.0. > > > > The timeline was rough because we wrote that in 2022, trying to look > > forward multiple releases. The gaps that were discussed have all been > > closed -- except for JBOD, which we are working on this quarter. > > > > The set of features needed for 4.0 is very clearly described in KIP-833. > > There's no uncertainty on that point. > > > > > > > > To answer the specific question you pose here, "what is to stop us from > > > redrawing it again and again?", wouldn't the suggestion of parallel > work > > > lanes brought up by Josep address this concern? > > > > > > > It's very important not to fragment the community by supporting multiple > > long-running branch lines. At the end of the day, once branch 3's time > has > > come, it needs to fade away, just like JDK 6 support or the old Scala > > producer. > > > > best, > > Colin > > > > > > > BR, > > > Anton > > > > > > Den tors 23 nov. 2023 kl 05:48 skrev Colin McCabe <cmcc...@apache.org > >: > > > > > >> On Tue, Nov 21, 2023, at 19:30, Luke Chen wrote: > > >> > Yes, KIP-853 and disk failure support are both very important > missing > > >> > features. For the disk failure support, I don't think this is a > > >> > "good-to-have-feature", it should be a "must-have" IMO. We can't > > announce > > >> > the 4.0 release without a good solution for disk failure in KRaft. > > >> > > >> Hi Luke, > > >> > > >> Thanks for the reply. > > >> > > >> Controller disk failure support is not missing from KRaft. I described > > how > > >> to handle controller disk failures earlier in this thread. > > >> > > >> I should note here that the broker in ZooKeeper mode also requires > > manual > > >> handling of disk failures. Restarting a broker with the same ID, but > an > > >> empty disk, breaks the invariants of replication when in ZK mode. > > Consider: > > >> > > >> 1. Broker 1 goes down. A ZK state change notification for /brokers > fires > > >> and goes on the controller queue. > > >> > > >> 2. Broker 1 comes back up with an empty disk. > > >> > > >> 3. The controller processes the zk state change notification for > > /brokers. > > >> Since broker 1 is up no action is taken. > > >> > > >> 4. Now broker 1 is in the ISR for any partitions it was previously, > but > > >> has no data. If it is or becomes leader for any partitions, > irreversable > > >> data loss will occur. > > >> > > >> This problem is more than theoretical. We at Confluent have observed > it > > in > > >> production and put in place special workarounds for the ZK clusters we > > >> still have. > > >> > > >> KRaft has never had this problem because brokers are removed from ISRs > > >> when a new incarnation of the broker registers. > > >> > > >> So perhaps ZK mode is not ready for production for Aiven? Since disk > > >> failures do in fact require special handling there. (And/or bringing > up > > new > > >> nodes with empty disks, which seems to be their main concern.) > > >> > > >> > > > >> > It’s also worth thinking about how Apache Kafka users who depend on > > JBOD > > >> > might look at the risks of not having a 3.8 release. JBOD support on > > >> KRaft > > >> > is planned to be added in 3.7, and is still in progress so far. So > > it’s > > >> > hard to say it’s a blocker or not. But in practice, even if the > > feature > > >> is > > >> > made into 3.7 in time, a lot of new code for this feature is > unlikely > > to > > >> be > > >> > entirely bug free. We need to maintain the confidence of those > users, > > and > > >> > forcing them to migrate through 3.7 where this new code is hardly > > >> > battle-tested doesn’t appear to do that. > > >> > > > >> > > >> As Ismael said, if there are JBOD bugs in 3.7, we will do follow-on > > point > > >> releases to address them. > > >> > > >> > Our goal for 4.0 should be that all the “main” features in KRaft are > > in > > >> > production ready state. To reach the goal, I think having one more > > >> release > > >> > makes sense. We can have different opinions about what the “main > > >> features” > > >> > in KRaft are, but we should all agree, JBOD is one of them. > > >> > > >> The current plan is for JBOD to be production-ready in the 3.7 branch. > > >> > > >> The other features of KRaft have been in production-ready state since > > the > > >> 3.3 release. (Well, except for delegation tokens and SCRAM, which were > > >> implemented in 3.5 and 3.6) > > >> > > >> > I totally agree with you. We can keep delaying the 4.0 release > > forever. > > >> I'd > > >> > also like to draw a line to it. So, in my opinion, the 3.8 release > is > > the > > >> > line. No 3.9, 3.10 releases after that. If this is the decision, > will > > >> your > > >> > concern about this infinite loop disappear? > > >> > > >> Well, the line was drawn in KIP-833. If we redraw it, what is to stop > us > > >> from redrawing it again and again? > > >> > > >> > > > >> > Final note: Speaking of the missing features, I can always cooperate > > with > > >> > you and all other community contributors to make them happen, like > we > > >> have > > >> > discussed earlier. Just let me know. > > >> > > > >> > > >> Thanks, Luke. I appreciate the offer. > > >> > > >> But, on the KRaft side, I still maintain that nothing is missing > except > > >> JBOD, which we already have a plan for. > > >> > > >> best, > > >> Colin > > >> > > >> > > >> > Thank you. > > >> > Luke > > >> > > > >> > On Wed, Nov 22, 2023 at 2:54 AM Colin McCabe <cmcc...@apache.org> > > wrote: > > >> > > > >> >> On Tue, Nov 21, 2023, at 03:47, Josep Prat wrote: > > >> >> > Hi Colin, > > >> >> > > > >> >> > I think it's great that Confluent runs KRaft clusters in > > production, > > >> >> > and it means that it is production ready for Confluent and it's > > users. > > >> >> > But luckily for Kafka, the community is bigger than this (self > > managed > > >> >> > in the cloud or in-prem, or customers of other SaaS companies). > > >> >> > > >> >> Hi Josep, > > >> >> > > >> >> Confluent is not the only company using or developing KRaft. Most > of > > the > > >> >> big organizations developing Kafka are involved. I mentioned > > Confluent's > > >> >> deployments because I wanted to be clear that KRaft mode is not > > >> >> experimental or new. Talking about software in production is a good > > way > > >> to > > >> >> clear up these misconceptions. > > >> >> > > >> >> Indeed, KRaft mode is many years old. It started around 2020, and > > became > > >> >> production-ready in AK 3.5 in 2022. ZK mode was deprecated in AK > 3.5, > > >> which > > >> >> was released June 2023. If we release AK 4.0 around April (or > maybe a > > >> month > > >> >> or two later) then that will be almost a full year between > > deprecation > > >> and > > >> >> removal of ZK mode. We've talked about this a lot, in KIPs, in > Apache > > >> blog > > >> >> posts, at conferences, and so forth. > > >> >> > > >> >> > We've heard at least from 1 SaaS company, Aiven (disclaimer, it > is > > my > > >> >> > employer) where the current feature set makes it not trivial to > > >> >> > migrate. This same issue might happen not only at Aiven but with > > any > > >> >> > user of Kafka who uses immutable infrastructure. > > >> >> > > >> >> Can you discuss why you feel it is "not trivial to migrate"? From > the > > >> >> discussion above, the main gap is that we should improve the > > >> documentation > > >> >> for handling failed disks. > > >> >> > > >> >> > Another case is for > > >> >> > users that have hundreds (or more) of clusters and more than 100k > > >> nodes > > >> >> > experience node failures multiple times during a single day. In > > this > > >> >> > situation, not having KIP 853 makes these power users unable to > > join > > >> >> > the game as introducing a new error-prone manual (or needed to > > >> >> > automate) operation is usually a huge no-go. > > >> >> > > >> >> We have thousands of KRaft clusters in production and haven't seen > > these > > >> >> problems, as I described above. > > >> >> > > >> >> best, > > >> >> Colin > > >> >> > > >> >> > > > >> >> > But I hear the concerns of delaying 4.0 for another 3 to 4 > months. > > >> >> > Would it help if we would aim at shortening the timeline for > 3.8.0 > > and > > >> >> > start with the 4.0.0 a bit earlier help? > > >> >> > Maybe we could work on 3.8.0 almost in parallel with 4.0.0: > > >> >> > - Start with 3.8.0 release process > > >> >> > - After a small time (let's say a week) create the release branch > > >> >> > - Start with 4.0.0 release process as usual > > >> >> > - Cherry pick KRaft related issues to 3.8.0 > > >> >> > - Release 3.8.0 > > >> >> > I suspect 4.0.0 will need a bit more time than usual to ensure > the > > >> code > > >> >> > is cleaned up of deprecated classes and methods on top of the > usual > > >> >> > work we have. For this reason I think there would be enough time > > >> >> > between releasing 3.8.0 and 4.0.0. > > >> >> > > > >> >> > What do you all think? > > >> >> > > > >> >> > Best, > > >> >> > Josep Prat > > >> >> > > > >> >> > On 2023/11/20 20:03:18 Colin McCabe wrote: > > >> >> >> Hi Josep, > > >> >> >> > > >> >> >> I think there is some confusion here. Quorum reconfiguration is > > not > > >> >> needed for KRaft to become production ready. Confluent runs > > thousands of > > >> >> KRaft clusters without quorum reconfiguration, and has for years. > > While > > >> >> dynamic quorum reconfiguration is a nice feature, it doesn't block > > >> >> anything: not migration, not deployment. As best as I understand > it, > > the > > >> >> use-case Aiven has isn't even reconfiguration per se, just wiping a > > >> disk. > > >> >> There are ways to handle this -- I discussed some earlier in the > > >> thread. I > > >> >> think it would be productive to continue that discussion -- > > especially > > >> the > > >> >> part around documentation and testing of these cases. > > >> >> >> > > >> >> >> A lot of people have done a lot of work to get Kafka 4.0 ready. > I > > >> would > > >> >> not want to delay that because we want an additional feature. And > we > > >> will > > >> >> always want additional features. So I am concerned we will end up > in > > an > > >> >> infinite loop of people asking for "just one more feature" before > > they > > >> >> migrate. > > >> >> >> > > >> >> >> best, > > >> >> >> Colin > > >> >> >> > > >> >> >> > > >> >> >> On Mon, Nov 20, 2023, at 04:15, Josep Prat wrote: > > >> >> >> > Hi all, > > >> >> >> > > > >> >> >> > I wanted to share my opinion regarding this topic. I know some > > >> >> >> > discussions happened some time ago (over a year) but I believe > > it's > > >> >> >> > wise to reflect and re-evaluate if those decisions are still > > valid. > > >> >> >> > KRaft, as of Kafka 3.6.x and 3.7.x, has not yet feature parity > > with > > >> >> >> > Zookeeper. By dropping Zookeeper altogether before achieving > > such > > >> >> >> > parity, we are opening the door to leaving a chunk of Apache > > Kafka > > >> >> >> > users without an easy way to upgrade to 4.0. > > >> >> >> > In pro of making upgrades as smooth as possible, I propose to > > have > > >> a > > >> >> >> > Kafka version where KIP-853 is merged and Zookeeper still is > > >> >> supported. > > >> >> >> > This will enable community members who can't migrate yet to > > KRaft > > >> to > > >> >> do > > >> >> >> > so in a safe way (rolling back is something goes wrong). > > >> >> Additionally, > > >> >> >> > this will give us more confidence on having KRaft replacing > > >> >> >> > successfully Zookeeper without any big problems by discovering > > and > > >> >> >> > fixing bugs or by confirming that KRaft works as expected. > > >> >> >> > For this I strongly believe we should have a 3.8.x version > > before > > >> >> 4.0.x. > > >> >> >> > > > >> >> >> > What do other think in this regard? > > >> >> >> > > > >> >> >> > Best, > > >> >> >> > > > >> >> >> > On 2023/11/14 20:47:10 Colin McCabe wrote: > > >> >> >> >> On Tue, Nov 14, 2023, at 04:37, Anton Agestam wrote: > > >> >> >> >> > Hi Colin, > > >> >> >> >> > > > >> >> >> >> > Thank you for your thoughtful and comprehensive response. > > >> >> >> >> > > > >> >> >> >> >> KIP-853 is not a blocker for either 3.7 or 4.0. We > discussed > > >> this > > >> >> in > > >> >> >> >> >> several KIPs that happened this year and last year. The > most > > >> >> notable was > > >> >> >> >> >> probably KIP-866, which was approved in May 2022. > > >> >> >> >> > > > >> >> >> >> > I understand this is the case, I'm raising my concern > > because I > > >> was > > >> >> >> >> > foreseeing some major pain points as a consequence of this > > >> >> decision. Just > > >> >> >> >> > to make it clear though: I am not asking for anyone to do > > work > > >> for > > >> >> me, and > > >> >> >> >> > I understand the limitations of resources available to > > implement > > >> >> features. > > >> >> >> >> > What I was asking is rather to consider the implications of > > >> >> _removing_ > > >> >> >> >> > features before there exists a replacement for them. > > >> >> >> >> > > > >> >> >> >> > I understand that the timeframe for 3.7 isn't feasible, and > > >> >> because of that > > >> >> >> >> > I think what I was asking is rather: can we make sure that > > there > > >> >> are more > > >> >> >> >> > 3.x releases until controller quorum online resizing is > > >> >> implemented? > > >> >> >> >> > > > >> >> >> >> > From your response, I gather that your stance is that it's > > >> >> important to > > >> >> >> >> > drop ZK support sooner rather than later and that the > > necessary > > >> >> pieces for > > >> >> >> >> > doing so are already in place. > > >> >> >> >> > > >> >> >> >> Hi Anton, > > >> >> >> >> > > >> >> >> >> Yes. I'm basically just repeating what we agreed upon in 2022 > > as > > >> >> part of KIP-833. > > >> >> >> >> > > >> >> >> >> > > > >> >> >> >> > --- > > >> >> >> >> > > > >> >> >> >> > I want to make sure I've understood your suggested sequence > > for > > >> >> controller > > >> >> >> >> > node replacement. I hope the mentions of Kubernetes are > > rather > > >> for > > >> >> examples > > >> >> >> >> > of how to carry things out, rather than saying "this is > only > > >> >> supported on > > >> >> >> >> > Kubernetes"? > > >> >> >> >> > > >> >> >> >> Apache Kafka is supported in lots of environments, including > > >> non-k8s > > >> >> ones. I was just pointing out that using k8s means that you control > > your > > >> >> own DNS resolution, which simplifies matters. If you don't control > > DNS > > >> >> there are some extra steps for changing the quorum voters. > > >> >> >> >> > > >> >> >> >> > > > >> >> >> >> > Given we have three existing nodes as such: > > >> >> >> >> > > > >> >> >> >> > - a.local -> 192.168.0.100 > > >> >> >> >> > - b.local -> 192.168.0.101 > > >> >> >> >> > - c.local -> 192.168.0.102 > > >> >> >> >> > > > >> >> >> >> > As well as a candidate node 192.168.0.103 that we want to > > >> replace > > >> >> for the > > >> >> >> >> > role of c.local. > > >> >> >> >> > > > >> >> >> >> > 1. Shut down controller process on node .102 (to make sure > we > > >> >> don't "go > > >> >> >> >> > back in time"). > > >> >> >> >> > 2. rsync state from leader to .103. > > >> >> >> >> > 3. Start controller process on .103. > > >> >> >> >> > 4. Point the c.local entry at .103. > > >> >> >> >> > > > >> >> >> >> > I have a few questions about this sequence: > > >> >> >> >> > > > >> >> >> >> > 1. Would this sequence be safe against leadership changes? > > >> >> >> >> > > > >> >> >> >> > > >> >> >> >> If the leader changes, the new leader should have all of the > > >> >> committed entries that the old leader had. > > >> >> >> >> > > >> >> >> >> > 2. Does it work > > >> >> >> >> > > >> >> >> >> Probably the biggest issue is dealing with "torn writes" that > > >> happen > > >> >> because you're copying the current log segment while it's being > > written > > >> to. > > >> >> The system should be robust against this. However, we don't > > regularly do > > >> >> this, so there hasn't been a lot of testing. > > >> >> >> >> > > >> >> >> >> I think Jose had a PR for improving the handling of this > which > > we > > >> >> might want to dig up. We'd want the system to auto-truncate the > > partial > > >> >> record at the end of the log, if there is one. > > >> >> >> >> > > >> >> >> >> > 3. By "state", do we mean `metadata.log.dir`? Something > else? > > >> >> >> >> > > >> >> >> >> Yes, the state of the metadata.log.dir. Keep in mind you will > > need > > >> >> to change the node ID in meta.properties after copying, of course. > > >> >> >> >> > > >> >> >> >> > 4. What are the effects on cluster availability? (I think > > this > > >> is > > >> >> the same > > >> >> >> >> > as asking what happens if a or b crashes during the > process, > > or > > >> if > > >> >> network > > >> >> >> >> > partitions occur). > > >> >> >> >> > > >> >> >> >> Cluster metadata state tends to be pretty small. typically a > > >> hundred > > >> >> megabytes or so. Therefore, I do not think it will take more than a > > >> second > > >> >> or two to copy from one node to another. However, if you do > > experience a > > >> >> crash when one node out of three is down, then you will be > > unavailable > > >> >> until you can bring up a second node to regain a majority. > > >> >> >> >> > > >> >> >> >> > > > >> >> >> >> > --- > > >> >> >> >> > > > >> >> >> >> > If this is considered the official way of handling > controller > > >> node > > >> >> >> >> > replacements, does it make sense to improve documentation > in > > >> this > > >> >> area? Is > > >> >> >> >> > there already a plan for this documentation layed out in > some > > >> >> KIPs? This is > > >> >> >> >> > something I'd be happy to contribute to. > > >> >> >> >> > > > >> >> >> >> > > >> >> >> >> Yes, I think we should have official documentation about > this. > > >> We'd > > >> >> be happy to review anything in that area. > > >> >> >> >> > > >> >> >> >> >> To circle back to KIP-853, I think it stands a good chance > > of > > >> >> making it > > >> >> >> >> >> into AK 4.0. > > >> >> >> >> > > > >> >> >> >> > This sounds good, but the point I was making was if we > could > > >> have > > >> >> a release > > >> >> >> >> > with both KRaft and ZK supporting this feature to ease the > > >> >> migration out of > > >> >> >> >> > ZK. > > >> >> >> >> > > > >> >> >> >> > > >> >> >> >> The problem is, supporting multiple controller > implementations > > is > > >> a > > >> >> huge burden. So we don't want to extend the 3.x release past the > > point > > >> >> that's needed to complete all the must-dos (SCRAM, delegation > tokens, > > >> JBOD) > > >> >> >> >> > > >> >> >> >> best, > > >> >> >> >> Colin > > >> >> >> >> > > >> >> >> >> > > >> >> >> >> > BR, > > >> >> >> >> > Anton > > >> >> >> >> > > > >> >> >> >> > Den tors 9 nov. 2023 kl 23:04 skrev Colin McCabe < > > >> >> cmcc...@apache.org>: > > >> >> >> >> > > > >> >> >> >> >> Hi Anton, > > >> >> >> >> >> > > >> >> >> >> >> It rarely makes sense to scale up and down the number of > > >> >> controller nodes > > >> >> >> >> >> in the cluster. Only one controller node will be active at > > any > > >> >> given time. > > >> >> >> >> >> The main reason to use 5 nodes would be to be able to > > tolerate > > >> 2 > > >> >> failures > > >> >> >> >> >> instead of 1. > > >> >> >> >> >> > > >> >> >> >> >> At Confluent, we generally run KRaft with 3 controllers. > We > > >> have > > >> >> not seen > > >> >> >> >> >> problems with this setup, even with thousands of clusters. > > We > > >> have > > >> >> >> >> >> discussed using 5 node controller clusters on certain very > > big > > >> >> clusters, > > >> >> >> >> >> but we haven't done that yet. This is all very similar to > > ZK, > > >> >> where most > > >> >> >> >> >> deployments were 3 nodes as well. > > >> >> >> >> >> > > >> >> >> >> >> KIP-853 is not a blocker for either 3.7 or 4.0. We > discussed > > >> this > > >> >> in > > >> >> >> >> >> several KIPs that happened this year and last year. The > most > > >> >> notable was > > >> >> >> >> >> probably KIP-866, which was approved in May 2022. > > >> >> >> >> >> > > >> >> >> >> >> Many users these days run in a Kubernetes environment > where > > >> >> Kubernetes > > >> >> >> >> >> actually controls the DNS. This makes changing the set of > > >> voters > > >> >> less > > >> >> >> >> >> important than it was historically. > > >> >> >> >> >> > > >> >> >> >> >> For example, in a world with static DNS, you might have to > > >> change > > >> >> the > > >> >> >> >> >> controller.quorum.voters setting from: > > >> >> >> >> >> > > >> >> >> >> >> 100@a.local:9073,101@b.local:9073,102@c.local:9073 > > >> >> >> >> >> > > >> >> >> >> >> to: > > >> >> >> >> >> > > >> >> >> >> >> 100@a.local:9073,101@b.local:9073,102@d.local:9073 > > >> >> >> >> >> > > >> >> >> >> >> In a world with k8s controlling the DNS, you simply remap > > >> c.local > > >> >> to point > > >> >> >> >> >> ot the IP address of your new pod for controller 102, and > > >> you're > > >> >> done. No > > >> >> >> >> >> need to update controller.quorum.voters. > > >> >> >> >> >> > > >> >> >> >> >> Another question is whether you re-create the pod data > from > > >> >> scratch every > > >> >> >> >> >> time you add a new node. If you store the controller data > > on an > > >> >> EBS volume > > >> >> >> >> >> (or cloud-specific equivalent), you really only have to > > detach > > >> it > > >> >> from the > > >> >> >> >> >> previous pod and re-attach it to the new pod. k8s also > > handles > > >> >> this > > >> >> >> >> >> automatically, of course. > > >> >> >> >> >> > > >> >> >> >> >> If you want to reconstruct the full controller pod state > > each > > >> >> time you > > >> >> >> >> >> create a new pod (for example, so that you can use only > > >> instance > > >> >> storage), > > >> >> >> >> >> you should be able to rsync that state from the leader. In > > >> >> general, the > > >> >> >> >> >> invariant that we want to maintain is that the state > should > > not > > >> >> "go back in > > >> >> >> >> >> time" -- if controller 102 promised to hold all log data > up > > to > > >> >> offset X, it > > >> >> >> >> >> should come back with committed data at at least that > > offset. > > >> >> >> >> >> > > >> >> >> >> >> There are lots of new features we'd like to implement for > > >> KRaft, > > >> >> and Kafka > > >> >> >> >> >> in general. If you have some you really would like to > see, I > > >> >> think everyone > > >> >> >> >> >> in the community would be happy to work with you. The flip > > >> side, > > >> >> of course, > > >> >> >> >> >> is that since there are an unlimited number of features we > > >> could > > >> >> do, we > > >> >> >> >> >> can't really block the release for any one feature. > > >> >> >> >> >> > > >> >> >> >> >> To circle back to KIP-853, I think it stands a good chance > > of > > >> >> making it > > >> >> >> >> >> into AK 4.0. Jose, Alyssa, and some other people have > > worked on > > >> >> it. It > > >> >> >> >> >> definitely won't make it into 3.7, since we have only a > few > > >> weeks > > >> >> left > > >> >> >> >> >> before that release happens. > > >> >> >> >> >> > > >> >> >> >> >> best, > > >> >> >> >> >> Colin > > >> >> >> >> >> > > >> >> >> >> >> > > >> >> >> >> >> On Thu, Nov 9, 2023, at 00:20, Anton Agestam wrote: > > >> >> >> >> >> > Hi Luke, > > >> >> >> >> >> > > > >> >> >> >> >> > We have been looking into what switching from ZK to > KRaft > > >> will > > >> >> mean for > > >> >> >> >> >> > Aiven. > > >> >> >> >> >> > > > >> >> >> >> >> > We heavily depend on an “immutable infrastructure” model > > for > > >> >> deployments. > > >> >> >> >> >> > This means that, when we perform upgrades, we introduce > > new > > >> >> nodes to our > > >> >> >> >> >> > clusters, scale the cluster up to incorporate the new > > nodes, > > >> >> and then > > >> >> >> >> >> phase > > >> >> >> >> >> > the old ones out once all partitions are moved to the > new > > >> >> generation. > > >> >> >> >> >> This > > >> >> >> >> >> > allows us, and anyone else using a similar model, to do > > >> >> upgrades as well > > >> >> >> >> >> as > > >> >> >> >> >> > cluster resizing with zero downtime. > > >> >> >> >> >> > > > >> >> >> >> >> > Reading up on KRaft and the ZK-to-KRaft migration path, > > this > > >> is > > >> >> somewhat > > >> >> >> >> >> > worrying for us. It seems like, if KIP-853 is not > included > > >> >> prior to > > >> >> >> >> >> > dropping support for ZK, we will essentially have no > > >> satisfying > > >> >> upgrade > > >> >> >> >> >> > path. Even if KIP-853 is included in 4.0, I’m unsure if > > that > > >> >> would allow > > >> >> >> >> >> a > > >> >> >> >> >> > migration path for us, since a new cluster generation > > would > > >> not > > >> >> be able > > >> >> >> >> >> to > > >> >> >> >> >> > use ZK during the migration step. > > >> >> >> >> >> > On the other hand, if KIP-853 was released in a version > > prior > > >> >> to dropping > > >> >> >> >> >> > ZK support, because it allows online resizing of KRaft > > >> >> clusters, this > > >> >> >> >> >> would > > >> >> >> >> >> > allow us and others that use an immutable infrastructure > > >> >> deployment > > >> >> >> >> >> model, > > >> >> >> >> >> > to provide a zero downtime migration path. > > >> >> >> >> >> > > > >> >> >> >> >> > For that reason, we’d like to raise awareness around > this > > >> issue > > >> >> and > > >> >> >> >> >> > encourage considering the implementation of KIP-853 or > > >> >> equivalent a > > >> >> >> >> >> blocker > > >> >> >> >> >> > not only for 4.0, but for the last version prior to 4.0. > > >> >> >> >> >> > > > >> >> >> >> >> > BR, > > >> >> >> >> >> > Anton > > >> >> >> >> >> > > > >> >> >> >> >> > On 2023/10/11 12:17:23 Luke Chen wrote: > > >> >> >> >> >> >> Hi all, > > >> >> >> >> >> >> > > >> >> >> >> >> >> While Kafka 3.6.0 is released, I’d like to start the > > >> >> discussion for the > > >> >> >> >> >> >> “road to Kafka 4.0”. Based on the plan in KIP-833 > > >> >> >> >> >> >> < > > >> >> >> >> >> > > > >> >> >> >> >> > > >> >> > > >> > > > https://cwiki.apache.org/confluence/display/KAFKA/KIP-833%3A+Mark+KRaft+as+Production+Ready#KIP833:MarkKRaftasProductionReady-Kafka3.7 > > >> >> >> >> >> >>, > > >> >> >> >> >> >> the next release 3.7 will be the final release before > > moving > > >> >> to Kafka > > >> >> >> >> >> 4.0 > > >> >> >> >> >> >> to remove the Zookeeper from Kafka. Before making this > > major > > >> >> change, I'd > > >> >> >> >> >> >> like to get consensus on the "must-have features/fixes > > for > > >> >> Kafka 4.0", > > >> >> >> >> >> to > > >> >> >> >> >> >> avoid some users being surprised when upgrading to > Kafka > > >> 4.0. > > >> >> The intent > > >> >> >> >> >> > is > > >> >> >> >> >> >> to have a clear communication about what to expect in > the > > >> >> following > > >> >> >> >> >> > months. > > >> >> >> >> >> >> In particular we should be signaling what features and > > >> >> configurations > > >> >> >> >> >> are > > >> >> >> >> >> >> not supported, or at risk (if no one is able to add > > support > > >> or > > >> >> fix known > > >> >> >> >> >> >> bugs). > > >> >> >> >> >> >> > > >> >> >> >> >> >> Here is the JIRA tickets list > > >> >> >> >> >> >> < > > >> >> > > https://issues.apache.org/jira/issues/?jql=labels%20%3D%204.0-blocker> > > >> >> >> >> >> I > > >> >> >> >> >> >> labeled for "4.0-blocker". The criteria I labeled as > > >> >> “4.0-blocker” are: > > >> >> >> >> >> >> 1. The feature is supported in Zookeeper Mode, but not > > >> >> supported in > > >> >> >> >> >> KRaft > > >> >> >> >> >> >> mode, yet (ex: KIP-858: JBOD in KRaft) > > >> >> >> >> >> >> 2. Critical bugs in KRaft, (ex: KAFKA-15489 : split > > brain in > > >> >> KRaft > > >> >> >> >> >> >> controller quorum) > > >> >> >> >> >> >> > > >> >> >> >> >> >> If you disagree with my current list, welcome to have > > >> >> discussion in the > > >> >> >> >> >> >> specific JIRA ticket. Or, if you think there are some > > >> tickets > > >> >> I missed, > > >> >> >> >> >> >> welcome to start a discussion in the JIRA ticket and > > ping me > > >> >> or other > > >> >> >> >> >> >> people. After we get the consensus, we can > label/unlabel > > it > > >> >> afterwards. > > >> >> >> >> >> >> Again, the goal is to have an open communication with > the > > >> >> community > > >> >> >> >> >> about > > >> >> >> >> >> >> what will be coming in 4.0. > > >> >> >> >> >> >> > > >> >> >> >> >> >> Below is the high level category of the list content: > > >> >> >> >> >> >> > > >> >> >> >> >> >> 1. Recovery from disk failure > > >> >> >> >> >> >> KIP-856 > > >> >> >> >> >> >> < > > >> >> >> >> >> > > > >> >> >> >> >> > > >> >> > > >> > > > https://cwiki.apache.org/confluence/display/KAFKA/KIP-856:+KRaft+Disk+Failure+Recovery > > >> >> >> >> >> >>: > > >> >> >> >> >> >> KRaft Disk Failure Recovery > > >> >> >> >> >> >> > > >> >> >> >> >> >> 2. Prevote to support controllers more than 3 > > >> >> >> >> >> >> KIP-650 > > >> >> >> >> >> >> < > > >> >> >> >> >> > > > >> >> >> >> >> > > >> >> > > >> > > > https://cwiki.apache.org/confluence/display/KAFKA/KIP-650%3A+Enhance+Kafkaesque+Raft+semantics > > >> >> >> >> >> >>: > > >> >> >> >> >> >> Enhance Kafkaesque Raft semantics > > >> >> >> >> >> >> > > >> >> >> >> >> >> 3. JBOD support > > >> >> >> >> >> >> KIP-858 > > >> >> >> >> >> >> < > > >> >> >> >> >> > > > >> >> >> >> >> > > >> >> > > >> > > > https://cwiki.apache.org/confluence/display/KAFKA/KIP-858%3A+Handle+JBOD+broker+disk+failure+in+KRaft > > >> >> >> >> >> >>: > > >> >> >> >> >> >> Handle > > >> >> >> >> >> >> JBOD broker disk failure in KRaft > > >> >> >> >> >> >> > > >> >> >> >> >> >> 4. Scale up/down Controllers > > >> >> >> >> >> >> KIP-853 > > >> >> >> >> >> >> < > > >> >> >> >> >> > > > >> >> >> >> >> > > >> >> > > >> > > > https://cwiki.apache.org/confluence/display/KAFKA/KIP-853%3A+KRaft+Controller+Membership+Changes > > >> >> >> >> >> >>: > > >> >> >> >> >> >> KRaft Controller Membership Changes > > >> >> >> >> >> >> > > >> >> >> >> >> >> 5. Modifying dynamic configurations on the KRaft > > controller > > >> >> >> >> >> >> > > >> >> >> >> >> >> 6. Critical bugs in KRaft > > >> >> >> >> >> >> > > >> >> >> >> >> >> Does this make sense? > > >> >> >> >> >> >> Any feedback is welcomed. > > >> >> >> >> >> >> > > >> >> >> >> >> >> Thank you. > > >> >> >> >> >> >> Luke > > >> >> >> >> >> >> > > >> >> >> >> >> > > >> >> >> >> > > >> >> >> > > >> >> > > >> > > >