Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Overview over Cluster Settings #74

Open
2 of 18 tasks
garloff opened this issue May 9, 2022 · 4 comments
Open
2 of 18 tasks

Overview over Cluster Settings #74

garloff opened this issue May 9, 2022 · 4 comments
Labels
Container Issues or pull requests relevant for Team 2: Container Infra and Tooling epic Issues that are spread across multiple sprints

Comments

@garloff
Copy link
Contributor

garloff commented May 9, 2022

As a SCS KaaS developer, I want to have an overview over the settings that various cluster management solutions offer.
https://scs.sovereignit.de/nextcloud/apps/files/?dir=/Sovereign%20Cloud%20Stack/Technology&fileid=5021

Definition of Ready:

  • User Story is small enough to be finished within one sprint
  • User Story is clear and understood by the whole team
  • Acceptance criteria are defined
  • Acceptance criteria are clear and understood by the whole team

Definition of Done:

  • All acceptance criteria are met
  • Changes have been reviewed
  • CI tests have run successfully
  • Documentation has been updated
  • Release Notes have been updated
@garloff garloff added container epic Issues that are spread across multiple sprints labels May 9, 2022
@garloff garloff added this to the v4.0.0 milestone May 9, 2022
@garloff
Copy link
Contributor Author

garloff commented May 23, 2022

Discussion 2022-05-23:

  • Avoid having too high entry-barriers and complexity just to have a base SCS compatibility
  • Focus on core!
  • Things that can easily be added by the customer afterwards should not be part of the base requirement.
  • Example: ingress: Requires load-balancer, which should be required. (Ingress should not be required.)
  • Trouble is that some things that can be done afterwards ARE cloud-provider (and/or node image) dependent

@garloff
Copy link
Contributor Author

garloff commented May 23, 2022

Node images discussion:

  • Upstream CAPI images exist (but are not meant for production)
  • Provider-independent images are very hard to do (hard to avoid provider-specific things)
  • So we would to define requirements to images rather than the images themselves
  • Still be useful to feed standard requirements upstream

Need discussion with upstream CAPI image folks.

@garloff
Copy link
Contributor Author

garloff commented May 23, 2022

Discussion on node-problem-detector:

  • Can be deployed as daemonset, so does not need to be integrated in node image
  • daemonset is under user control, so this should be preferred (over the systemd unit approach)
  • Requirement for node images would be that they don't break the daemonset way of deploying n-p-d

Trouble is that Node-problem-detector implementation depends on the exact OS (linux distribution) used in the node image.

@itrich itrich removed the container label Aug 15, 2022
@fkr
Copy link
Member

fkr commented Oct 18, 2022

This issue is marked for R3. Will this be scope of R4?

@itrich itrich added the Container Issues or pull requests relevant for Team 2: Container Infra and Tooling label Oct 18, 2022
@tibeer tibeer mentioned this issue Mar 29, 2023
@jschoone jschoone removed this from the R3 (v4.0.0) milestone Apr 28, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Container Issues or pull requests relevant for Team 2: Container Infra and Tooling epic Issues that are spread across multiple sprints
Projects
Status: Refined Stories
Development

No branches or pull requests

4 participants