-
Notifications
You must be signed in to change notification settings - Fork 78
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Azure clusters in existing resource groups #5
Comments
Currently not. It seems, that there are still issues with orphaned iaas resources after LB service deletion exists. See here: kubernetes/kubernetes#59255 |
@dkistner any updates here for Kubernetes 1.{9,10,11,12}? |
kubernetes/kubernetes#67604 Maybe relevant? |
@dkistner any update here? |
Ping... @dkistner. |
I think there is no update as we still see also with latest k8s versions (v1.13, 1.14) left overs in Azure, we would not get rid of them when we delete the cluster. Currently we manage the ResourceGroup and drop it when the Shoot gets deleted. All left overs will be deleted during this process. This would not be the case for existing ResourceGroups because then we would not delete them. My advise: Wait until we see no left overs anymore and when we have enough trust that the clean up works reliable. |
@dkistner what I understand from the Kubernetes 1.15 release notes this scenario should become possible, right? |
We are currently testing if the infrastructure left overs are gone with the changes in k8s v1.15. I would recommend to re-enable this only if we are sure that we are really not experience any leaked resources. Let's wait for our test results. |
We will enable Azure Shoot deployments into existing vNets, which are located in a different resource group as the Shoot resources. Current status:
In general I see with this change no reason why we should re-enable deployments in existing resource groups. We had that only because the Azure Kubernetes provider supported only deployment in existing vNets which are in the same resource group as the cluster resources and we disabled it due to the orphan resource issues (which partly still exists). Meanwhile the Azure Kubernetes provider support also deployments in existing vNets which are in other resource groups (this scenario is now implemented). |
@dkistner can we close this issue ? |
No only the deployment into existing vnets is implemented. The second part deployment into existing resource groups is still in discussion. |
ok. I have updated the description of this issue and marked the vNETs as implemented. |
We would be interested in this as we are currently in discussions with a customer about deploying a shoot into their Azure subscription. Being able to create resource groups seems to require quite broad permissions which we would like to avoid. |
As far a I recall correctly the only argument against Shoot deployment into existing resource groups are the left overs which could remain on the infrastructure when the cluster is deleted. Unfortunately the Azure cloud provider have still issues with that. |
So you would say it could be enabled again and there would be a disclaimer somewhere that it can result in orphaned resources? |
Yes, something like this I could image. Users have to be aware that some left overs can remain if the cluster is gone. |
@muenchdo wanna give it a try? If you need help just ping, happy to guide you |
Some time back we have disabled deployments into existing Azure resource groups and existing Azure VNets because the Azure cloud provider implementation did not clean up self-created resources properly (tested with version 1.7.6).
Has the Azure cloud provider been improved in that regards so that we can re-enable it again?
Status:
ref: Azure: Allow deployments into existing vNets gardener#1558 Azure: Allow to deploy cluster in existing vNets gardener-attic/gardener-extensions#371
The text was updated successfully, but these errors were encountered: