-
Notifications
You must be signed in to change notification settings - Fork 78
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Deploy shoots in existing Neutron networks #317
Conversation
/assign |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Had a first look and looks overall good.
Just a few minor comments and the question how we proceed with the subnet id in the machine classes.
docs/usage-as-end-user.md
Outdated
@@ -62,6 +63,8 @@ If you don't know which floating pools are available look it up in the respectiv | |||
|
|||
With `floatingPoolSubnetName` you can explicitly define to which subnet in the floating pool network (defined via `floatingPoolName`) the router should be attached to. | |||
|
|||
If `networks.id` is an optional field. If it is given, you can specify the uuid of an existing Neutron network (created manually, by other tooling, ...) that should be reused. A new subnet for the Shoot will be created in it. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If `networks.id` is an optional field. If it is given, you can specify the uuid of an existing Neutron network (created manually, by other tooling, ...) that should be reused. A new subnet for the Shoot will be created in it. | |
If `networks.id` is an optional field. If it is given, you can specify the uuid of an existing private Neutron network (created manually, by other tooling, ...) that should be reused. A new subnet for the Shoot will be created in it. |
@@ -41,6 +41,8 @@ type Networks struct { | |||
Worker string | |||
// Workers is a CIDRs of a worker subnet (private) to create (used for the VMs). | |||
Workers string | |||
// ID is the name of an existing network that should be reused |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
// ID is the name of an existing network that should be reused | |
// ID is the name of an existing private network that should be reused. |
pkg/controller/worker/machines.go
Outdated
@@ -158,6 +163,10 @@ func (w *workerDelegate) generateMachineConfig(ctx context.Context) error { | |||
}, | |||
} | |||
|
|||
if !infrastructureStatus.Networks.ManagedPrivateNetwork { | |||
machineClassSpec["subnetID"] = subnet.ID |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Here we had the discussion if not now always want to pass the subnet id right?
That would force mcm for all new machine to manage also the port. Existing machines would not be rolled as the subnet id is not passed to the worker pool hash, right?
b9c2d85
to
f3f8e81
Compare
Co-authored-by: Dominic Kistner <dominic.kistner@sap.com> Co-authored-by: Thomas Buchner <MrBatschner@users.noreply.github.com>
f3f8e81
to
ec4fb3b
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I played a little with it. Just a small comment.
Otherwise it looks good to me.
@@ -37,6 +37,9 @@ providerSpec: | |||
availabilityZone: {{ $machineClass.availabilityZone }} | |||
flavorName: {{ $machineClass.machineType }} | |||
keyName: {{ $machineClass.keyName }} | |||
{{- if $machineClass.subnetID }} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is that check now still required when we always pass a subnet id?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nice catch
How to categorize this PR?
/area control-plane
/kind enhancement
/platform openstack
What this PR does / why we need it:
Allows the creation of shoots into existing user-managed networks.
Which issue(s) this PR fixes:
Fixes #
Special notes for your reviewer:
Release note: