Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

WIP: create dedicated app for cert-manager #829

Draft
wants to merge 9 commits into
base: main
Choose a base branch
from

Conversation

davidspek
Copy link
Contributor

@davidspek davidspek commented Sep 5, 2023

Summary

This PR creates a dedicated app for cert-manager so that its version can be maintained more easily, it's more clear to users what's installed on their cluster and what versions the apps are, to improve security by isolation cert-manager into its own namespace, and to be able to improve the new CAPI bootstrapping steps (so providers are installed after cert-manager is running). This change needs further testing since on Azure and GCP to ensure the cloud permissions work correctly, as well as with Plural DNS although that likely won't have any issues.

Test Plan

  • Tested that AWS Route53 still works
  • Tested that GCP Cloud DNS still works
  • Tested that Azure DNS still works
  • Tested when using Plural DNS
  • Tested while used in the CAPI deployment and migration

Checklist

  • No images hosted from dockerhub
  • Are dashboards present to understand the health of the application. There must be at least 1 of these
    • all databases should have dashboards
    • ideally also have at least cpu/mem utilization dashboards for webserver tier of the app
    • you can use plural from-grafana to convert a grafana dashboard found via google to our CRD
  • Are scaling runbooks present
    • all databases must have scaling runbooks
    • you can use the charts in pluralsh/module-library to accelerate this
  • do you need to add config overlays?
    • inputing secrets
    • configuring autoscaling
  • If there’s a web-facing component to the app, we need to support OIDC authentication and setting up private networks if no authentication option is viable
  • All major clouds must be supported
    • Azure
    • AWS
    • GCP

davidspek and others added 8 commits September 5, 2023 16:54
Signed-off-by: David van der Spek <vanderspek.david@gmail.com>
Signed-off-by: David van der Spek <vanderspek.david@gmail.com>
Signed-off-by: David van der Spek <vanderspek.david@gmail.com>
Signed-off-by: David van der Spek <vanderspek.david@gmail.com>
Signed-off-by: David van der Spek <vanderspek.david@gmail.com>
Signed-off-by: David van der Spek <vanderspek.david@gmail.com>
Signed-off-by: David van der Spek <vanderspek.david@gmail.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants