Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Defining new types for Cloudstack AvailabilityZone development #2412
Defining new types for Cloudstack AvailabilityZone development #2412
Changes from 17 commits
f01e5f0
4e9717f
48a49c6
7a1a24b
e0209e1
d5a4cb3
79d1698
836e096
8732bec
8dd9e44
5d59551
545d2d1
d4aa8b6
7c6cb84
dd081c4
2f78096
b9db281
50f7b73
83a3828
aab0350
6201e80
3e56b0a
fd06a1d
75b321c
b353a4e
7475853
2c76dbb
File filter
Filter by extension
Conversations
Jump to
There are no files selected for viewing
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Instead of saying this matches the ini file, can we just say this references a secret in the
eksa-namespace
?We could explain how the ini file works and maps to secrets in the "text docs" as opposed to the CRD API docs.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Maybe worth to mention in which scenarios this file will be required? For example: when creating a management cluster, always. But what about upgrade? What about workload clusters?
Another interesting questions is, what happens if the user provides an ini file with a "secret" that already exists? (imagine for management cluster upgrades). Will the secret be updated or should they be immutable?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think we would model all these decisions from what the vsphere provider currently has defined. As I understand, the secrets can be updated on every eks-a operation (create, upgrade) so I would expect the file will be required for every operation. VSphere seems to apply the generated secrets from the input credentials on every operation and ignores old ones. I suppose this isn't the cleanest approach but old secrets could be cleaned up manually in the worst case.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I would recommend not following what vsphere does just because that's the status quo. Some of the logic in the vsphere provider was intentional, some other logic was just built over time. Also, vSphere might have other constraints different than cloudstack (for starters, it doesn't support multiendpoint).
If you want to overwrite secrets: are those secrets gonna be unique per cluster? Or will different clusters share the same secrets as long as they share the same availability zones?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Updated doc to reflect our offline discussion - EKS-A will create secrets but not modify existing ones to prevent unintentional overwrites. If users want to modify credentials, they can do so manually, see below
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
does it mean every time we pass an updated ini and run upgrade cmd, eks-a creates a new secret and update the CredentialRef to point to the new secret? what happens to the old unused secrets?