-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update installation to target Grafana Operator v5 #526
Merged
Merged
Changes from all commits
Commits
File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why are we changing the namespace here?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Grafana Operator v5 can (and is recommended to) be installed as a cluster-scoped operator, so this is being updated to match our other cluster-scoped operators (such as COO).
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I don't think it's a good idea to install non-openshift operators into that project. COO is installed there, like you say, but maybe it shouldn't be, either? At least it's our product.
One reason is that openshift-operators has this setting
pod-security.kubernetes.io/enforce: privileged
whereas the service-telemetry namespace, for example, haspod-security.kubernetes.io/enforce: baseline
, so I think this affects the security posture.There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Huh.... that seems to be the default recommended installation via the UI....
<removes operator, checks UI again for what happens>
In the Console UI when installing the Grafana Operator from the v5 channel, it defaults to All Namespaces (cluster scoped) and it won't even let me pick a different project other than openshift-operators... I'm not entirely sure why that is...
I've been trying to look at other operator install documents from the OpenShift documentation, and everyone seems to do it a little bit different. We install cert-manager into it's own
cert-manager-operator
namespace. While COO is installed in openshift-operators, and that was a pattern I was following, it seems there are some implications to that.Should we adjust our default practices here to create say a
grafana-operator
namespace and install the Operator there? I will need to see if that results in it being cluster or namespace scoped by default when installed from CLI. I'm not really sure what the Subscription configuration needs to look like to be namespace vs cluster scoped either... I'll have to investigate that.Should we also get COO installed in a consistent manner where we create a cluster-observability-operator namespace if we want to have separate namespaces for the operators?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Answer to my own question:
I forgot about OperatorGroups. That's what defines the Operator as being installed in AllNamespaces or SingleNamespace.
https://docs.openshift.com/container-platform/4.14/operators/user/olm-installing-operators-in-namespace.html#olm-installing-operator-from-operatorhub-using-cli_olm-installing-operators-in-namespace
I do notice that even in the documentation here that they direct to using
openshift-operators
as the target installation namespace for AllNamespace operators...From step 4:
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
That's pretty convincing. I'd never really considered this issue before this PR and was trying to figure out the implications. If the openshift docs are saying to use that namespace, then I guess it's okay.