-
Notifications
You must be signed in to change notification settings - Fork 63
Add app-autoscaler-release #127
Add app-autoscaler-release #127
Conversation
The current release images need to make some changes. We now using the personal image repo since we have no access to the
postgres:
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Awesome! Thanks a lot for the PR. I left a first change request, then we can go from there given the structure will change.
…o autoscaler-deployment
deploy/helm/kubecf/assets/operations/instance_groups/app_autoscaler.yaml
Outdated
Show resolved
Hide resolved
deploy/helm/kubecf/assets/operations/instance_groups/app_autoscaler.yaml
Outdated
Show resolved
Hide resolved
deploy/helm/kubecf/assets/operations/instance_groups/app_autoscaler.yaml
Outdated
Show resolved
Hide resolved
deploy/helm/kubecf/assets/operations/instance_groups/app_autoscaler.yaml
Outdated
Show resolved
Hide resolved
deploy/helm/kubecf/assets/operations/instance_groups/app_autoscaler.yaml
Outdated
Show resolved
Hide resolved
deploy/helm/kubecf/assets/operations/instance_groups/app_autoscaler.yaml
Outdated
Show resolved
Hide resolved
deploy/helm/kubecf/assets/operations/instance_groups/app_autoscaler.yaml
Outdated
Show resolved
Hide resolved
deploy/helm/kubecf/assets/operations/instance_groups/app_autoscaler.yaml
Outdated
Show resolved
Hide resolved
deploy/helm/kubecf/assets/operations/instance_groups/app_autoscaler.yaml
Outdated
Show resolved
Hide resolved
@f0rmiga I have changed the PR against your last comment. Any other comments about this PR? Thanks, |
@aqan213 The |
@f0rmiga Thanks for the changes. I tested manually and just a little values needed to be modified. Such as the health port for the |
deploy/helm/kubecf/assets/operations/instance_groups/app-autoscaler.yaml
Show resolved
Hide resolved
deploy/helm/kubecf/assets/operations/instance_groups/app-autoscaler.yaml
Outdated
Show resolved
Hide resolved
deploy/helm/kubecf/assets/operations/instance_groups/app-autoscaler.yaml
Outdated
Show resolved
Hide resolved
deploy/helm/kubecf/assets/operations/instance_groups/app-autoscaler.yaml
Outdated
Show resolved
Hide resolved
deploy/helm/kubecf/assets/operations/instance_groups/app-autoscaler.yaml
Show resolved
Hide resolved
deploy/helm/kubecf/assets/operations/instance_groups/app-autoscaler.yaml
Show resolved
Hide resolved
deploy/helm/kubecf/assets/operations/instance_groups/app-autoscaler.yaml
Show resolved
Hide resolved
"${LOG_DIR}/pg_janitor_ctl.log" \ | ||
"${LOG_DIR}/pg_janitor_ctl.err.log" | ||
|
||
# TODO: set these skip_ssl_validation to false if the cf API (api.((system_domain))) public cert is provided by the user. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I assume this is because those jobs can't take extra certs (only the system ones)?
How will that work if the user provides a non-public cert (as in, a custom cert that chains up to their company-local CA)?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If the cert is trust and the skip_ssl_validation
can be set to false
. But if the cert is not trust(if access the url with the cert from browser, it reports "Your connection is not secure"), the skip_ssl_validation
value should be true
.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Right, those would be the system certs (VeriSign, Let's Encrypt, CNNIC, Microsoft, …)
I'm thinking about cases of actual deployment: for example, SUSE has an internal CA, which is used for some internal services. That CA does not sign anything public (and is not in the standard list of public CAs), but is deployed to any internal systems to be trusted. How would that be propagated correctly in this case?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Generally I like this a lot better, thanks for the changes!
"${LOG_DIR}/pg_janitor_ctl.log" \ | ||
"${LOG_DIR}/pg_janitor_ctl.err.log" | ||
|
||
# TODO: set these skip_ssl_validation to false if the cf API (api.((system_domain))) public cert is provided by the user. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Right, those would be the system certs (VeriSign, Let's Encrypt, CNNIC, Microsoft, …)
I'm thinking about cases of actual deployment: for example, SUSE has an internal CA, which is used for some internal services. That CA does not sign anything public (and is not in the standard list of public CAs), but is deployed to any internal systems to be trusted. How would that be propagated correctly in this case?
deploy/helm/kubecf/assets/operations/instance_groups/app-autoscaler.yaml
Show resolved
Hide resolved
deploy/helm/kubecf/assets/operations/instance_groups/app-autoscaler.yaml
Show resolved
Hide resolved
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I guess I'll try making a follow-up PR for the script thing, if I manage to do it… 😿
Add app-autoscaler-release
Description
Add the app-autoscaler bosh release to kubecf helm chart .
https://bosh.io/releases/github.com/cloudfoundry-incubator/app-autoscaler-release?version=2.0.0
Motivation and Context
How Has This Been Tested?
Manually.
Screenshots (if appropriate):
Types of changes
Checklist: