Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Azure clusters in existing resource groups #5

Open
1 of 2 tasks
rfranzke opened this issue Jan 16, 2018 · 19 comments
Open
1 of 2 tasks

Azure clusters in existing resource groups #5

rfranzke opened this issue Jan 16, 2018 · 19 comments
Labels
kind/roadmap Roadmap BLI lifecycle/rotten Nobody worked on this for 12 months (final aging stage)

Comments

@rfranzke
Copy link
Member

Some time back we have disabled deployments into existing Azure resource groups and existing Azure VNets because the Azure cloud provider implementation did not clean up self-created resources properly (tested with version 1.7.6).

Has the Azure cloud provider been improved in that regards so that we can re-enable it again?

Status:

@rfranzke
Copy link
Member Author

cc @dkistner @AndreasBurger

@dkistner
Copy link
Member

dkistner commented Feb 5, 2018

Currently not. It seems, that there are still issues with orphaned iaas resources after LB service deletion exists. See here: kubernetes/kubernetes#59255
They are already working on a fix for this issue, but I'm not sure if this is the only remaining issue. Further investigation is required.

@vlerenc vlerenc changed the title Can we re-enable deployments into existing Azure resource groups/vnets? [Azure] Can we re-enable deployments into existing Azure resource groups/vnets? Feb 11, 2018
@rfranzke
Copy link
Member Author

rfranzke commented Oct 5, 2018

@dkistner any updates here for Kubernetes 1.{9,10,11,12}?

@rfranzke
Copy link
Member Author

rfranzke commented Oct 5, 2018

kubernetes/kubernetes#67604 Maybe relevant?

@rfranzke
Copy link
Member Author

rfranzke commented Jan 8, 2019

@dkistner any update here?

@vlerenc
Copy link
Member

vlerenc commented Apr 10, 2019

Ping... @dkistner.

@dkistner
Copy link
Member

dkistner commented May 8, 2019

I think there is no update as we still see also with latest k8s versions (v1.13, 1.14) left overs in Azure, we would not get rid of them when we delete the cluster. Currently we manage the ResourceGroup and drop it when the Shoot gets deleted. All left overs will be deleted during this process. This would not be the case for existing ResourceGroups because then we would not delete them.

My advise: Wait until we see no left overs anymore and when we have enough trust that the clean up works reliable.

@rfranzke rfranzke transferred this issue from gardener/gardener Jun 12, 2019
@rfranzke
Copy link
Member Author

@dkistner what I understand from the Kubernetes 1.15 release notes this scenario should become possible, right?

@dkistner
Copy link
Member

We are currently testing if the infrastructure left overs are gone with the changes in k8s v1.15. I would recommend to re-enable this only if we are sure that we are really not experience any leaked resources. Let's wait for our test results.

@dkistner
Copy link
Member

dkistner commented Oct 15, 2019

We will enable Azure Shoot deployments into existing vNets, which are located in a different resource group as the Shoot resources.

Current status:

In general I see with this change no reason why we should re-enable deployments in existing resource groups. We had that only because the Azure Kubernetes provider supported only deployment in existing vNets which are in the same resource group as the cluster resources and we disabled it due to the orphan resource issues (which partly still exists). Meanwhile the Azure Kubernetes provider support also deployments in existing vNets which are in other resource groups (this scenario is now implemented).
Therefore I would suggest to remove the inactive validation logic in the Gardener for the existing resource group case and close this issue afterwards. WDYT? @rfranzke, @AndreasBurger, @vlerenc

@vpnachev
Copy link
Member

@dkistner can we close this issue ?

@dkistner
Copy link
Member

dkistner commented Nov 25, 2019

No only the deployment into existing vnets is implemented. The second part deployment into existing resource groups is still in discussion.

@vpnachev
Copy link
Member

vpnachev commented Nov 26, 2019

ok. I have updated the description of this issue and marked the vNETs as implemented.

@rfranzke rfranzke changed the title [Azure] Can we re-enable deployments into existing Azure resource groups/vnets? [Azure] Can we re-enable deployments into existing Azure resource groups? Dec 30, 2019
@rfranzke rfranzke transferred this issue from gardener-attic/gardener-extensions Jan 30, 2020
@muenchdo
Copy link

We would be interested in this as we are currently in discussions with a customer about deploying a shoot into their Azure subscription. Being able to create resource groups seems to require quite broad permissions which we would like to avoid.

@dkistner
Copy link
Member

As far a I recall correctly the only argument against Shoot deployment into existing resource groups are the left overs which could remain on the infrastructure when the cluster is deleted. Unfortunately the Azure cloud provider have still issues with that.
So yes, I think we can discuss to enable that.
Btw: PRs for that are warmly welcome :)

@muenchdo
Copy link

So you would say it could be enabled again and there would be a disclaimer somewhere that it can result in orphaned resources?

@dkistner
Copy link
Member

Yes, something like this I could image. Users have to be aware that some left overs can remain if the cluster is gone.

@rfranzke
Copy link
Member Author

rfranzke commented Apr 8, 2020

@muenchdo wanna give it a try? If you need help just ping, happy to guide you

@gardener-robot gardener-robot added the lifecycle/stale Nobody worked on this for 6 months (will further age) label Jun 8, 2020
@gardener-robot gardener-robot added lifecycle/rotten Nobody worked on this for 12 months (final aging stage) and removed lifecycle/stale Nobody worked on this for 6 months (will further age) labels Sep 19, 2020
@dkistner dkistner removed the lifecycle/rotten Nobody worked on this for 12 months (final aging stage) label Nov 9, 2020
vpnachev added a commit that referenced this issue Aug 13, 2021
``` other operator github.com/gardener/cloud-provider-azure #5 @vpnachev
`k8s.io/legacy-cloud-providers` is now updated to `v0.21.4`.
```
@gardener-robot gardener-robot added the lifecycle/stale Nobody worked on this for 6 months (will further age) label Sep 22, 2021
@dkistner dkistner changed the title [Azure] Can we re-enable deployments into existing Azure resource groups? Azure clusters in existing resource groups Dec 3, 2021
@gardener-robot gardener-robot added lifecycle/rotten Nobody worked on this for 12 months (final aging stage) and removed lifecycle/stale Nobody worked on this for 6 months (will further age) labels Jun 2, 2022
@gardener-robot gardener-robot added kind/roadmap Roadmap BLI and removed roadmap/cloud labels Mar 23, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/roadmap Roadmap BLI lifecycle/rotten Nobody worked on this for 12 months (final aging stage)
Projects
None yet
Development

No branches or pull requests

6 participants