Skip to content

Commit a00a770

Browse files
committed
Review feedback
1 parent 9865b47 commit a00a770

File tree

1 file changed

+12
-10
lines changed

1 file changed

+12
-10
lines changed

modules/ROOT/pages/policies.adoc

Lines changed: 12 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -14,20 +14,19 @@ The guarantees we give are on multiple levels as detailed below:
1414
* The SDP itself
1515
* CustomResourceDefinition (CRD) versions
1616
* Supported product versions
17-
* Supported OpenShift & Kubernetes
17+
* Supported OpenShift & Kubernetes versions
1818
1919
All these policies may evolve as we learn what works best for our customers and for us.
2020

21-
These policies are from *June 2023*.
21+
These policies are from *July 2023*.
2222

2323

2424
== Stackable Data Platform Lifecycle Policy
2525

2626
NOTE: This policy concerns releases of our platform as a whole and how long and to which extent we support each version.
2727

2828
We do releases of our Stackable Data Platform.
29-
30-
These releases get a name based on the date they have been released (e.g. `23.4`, `23.7`). This name does not follow Semantic Versioning (Semver). We may release patches for a release, which then follow the PATCH naming semantics of Semver (e.g. `23.4.1`). See below for our policy on patches for the SDP.
29+
These releases get a name based on the year and month they have been released in (e.g. `23.4`, `23.7`, also called https://calver.org/[CalVer]). This name does not follow Semantic Versioning (https://semver.org/[SemVer]). We may release patches for a release, which then follow the PATCH naming semantics of SemVer (e.g. `23.4.1`) or the _Micro_ name from CalVer. See below for our policy on patches for the SDP.
3130

3231
We do support an SDP release for a specific time after its release.
3332

@@ -44,6 +43,7 @@ The following pictures show both scenarios:
4443
TODO: Insert diagrams here
4544

4645
We _will_ release new patch releases of a SDP release (e.g. `23.4.1`) for any issues we deem Critical or High (see definition below) once fixes become available.
46+
We _may_ release new patch releases for other reasons.
4747

4848
=== Maintenance Phase
4949

@@ -57,8 +57,8 @@ TODO: Insert diagram
5757

5858
We may release patches for other reasons.
5959

60-
Customers are expected to upgrade their SDP environment to the most current supported patch (`23.4.z`) version.
61-
60+
Customers are expected to upgrade their SDP environment to the most current supported patch/micro (`23.4.z`) version.
61+
Make sure to follow our release notes to learn of valid upgrade paths, some intermediate updates might be necessary.
6262

6363
== CRD Versioning Lifecycle Policy
6464

@@ -94,12 +94,13 @@ SDP ships with a lot of different downstream products (e.g. Apache HBase, Apache
9494

9595
All of these products follow their own version semantics and release cadences and lifecycles, which is why we do not define a product lifecycle policy based on version numbers alone.
9696

97-
For every one of the products we ship we always support one LTS (Long Term Support) release line, which we generally recommend to use. A release line usually means that we are going to keep a `major.minor` release stable but will include newer patch versions in later SDP releases.
97+
For every one of the products we ship we always support one LTS (Long Term Support) release line, which we generally recommend to use.
98+
A release line usually means that we are going to keep a `major.minor` release stable but will include newer patch versions in later SDP releases.
9899

99100
Some products (e.g. Trino) don't follow Semver rules, for those we will follow separate rules and clearly document what version is considered LTS.
100101

101102
Every LTS release line is shipped for at least one full year.
102-
After a year we may switch to a new release line.
103+
After a year we may switch to a new release line - but there will always be at least an overlap of one release in which the old LTS version is deprecated, but a new LTS version is available.
103104
Which line we chose as our LTS release is at our own discretion and is based on popularity, upstream lifecycle policies, stability, our own experience and other factors.
104105

105106
In addition to the LTS line we may also ship other versions, e.g. the latest upstream version.
@@ -126,12 +127,13 @@ We may ship new versions for existing SDP releases for other issues as well.
126127

127128
For every SDP release we will publish a list of supported Kubernetes versions.
128129

129-
We are aiming to support the last three Kubernetes versions but will make case-by-case decisions by taking into account the currently supported OpenShift versions as published by RedHat where it is our goal to support all versions that are in Full or Maintenance support. As the releases may be overlapping we might not always support the latest Kubernetes or OpenShift versions when we release a SDP version.
130+
We are aiming to support the last three Kubernetes versions but will make case-by-case decisions by taking into account the currently supported Kubernetes versions.
131+
We will also take into account currently supported OpenShift versions as published by RedHat. It is our goal to support all versions that are in Full or Maintenance support. As the releases may be overlapping we might not always support the latest Kubernetes or OpenShift versions when we release a SDP version.
130132

131133

132134
== Support Policy (Security & Bugs)
133135

134-
Stackable will analyze all published security vulnerabilities (e.g. CVEs but other sources may apply as well) for all the products we support. We take various sources into account when assigning a criticality. Among those sources is the NVD database, but we place higher value on the self-assessments by the projects themselves, and we will additionally evaluate all vulnerabilities in the context of how they are used in the Stackable Data Platform.
136+
Stackable will analyze published security vulnerabilities (e.g. CVEs but other sources may apply as well) for all the products we support as well components developed by us and their dependencies. We take various sources into account when assigning a criticality. Among those sources is the NVD database, but we place higher value on the self-assessments by the projects themselves, and we will additionally evaluate vulnerabilities in the context of how they are used in the Stackable Data Platform.
135137

136138
We will then assign a criticality to each vulnerability according to similar rating categories that https://access.redhat.com/security/updates/classification[RedHat has established]:
137139

0 commit comments

Comments
 (0)