This adds docs for the new mtnamespace work.#2325
This adds docs for the new mtnamespace work.#2325mattmoor wants to merge 1 commit intoknative:masterfrom
Conversation
This work is happening here: knative/eventing#2778
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: mattmoor The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
| out of this behavior you can label them with: | ||
|
|
||
| ```bash | ||
| kubectl label namespace default knative-eventing-injection=disabled |
There was a problem hiding this comment.
Is this really going to work? if you first create the NS, ns controller will create the broker? perhaps we should say here that you have to create with the label?
There was a problem hiding this comment.
You'd have to do it before installing things today. Honestly, setting this label to "disabled" with EITHER namespace controller should clean up the auto-generated Broker, opened knative/eventing#2796.
|
So, do we really need this, in every namespave ? now, what if there is an even bigger cluster, with 100+ namespaces - all not related to Knative at all? they all really need a borker ? |
|
Honestly the notion of a "default" Broker per-namespace evokes a strong parallel to K8s ServiceAccounts, which are created in every namespace whether I ask for it or even use it (or not). So IMO we should either:
Can we quantify or qualify the problem or cost in the 100+ namespaces that you are concerned about? I'd rather not deal in FUD if we can share concrete problems. |
Separately from the question of whether MT brokers should be opt-in or opt-out, the original purpose of the namespace magic was to work around the per-broker requirement of additional deployments, services, RBAC, etc. It seems like this doesn't apply to the MT broker since it doesn't create any additional per-Broker objects. |
|
For the sake of having an "off" switch should things go bad (as they did for FWIW, in serving, the |
|
Late to this conversation, but I wanted to link my comment on knative/eventing#2946 (comment).
Regarding the parallel with Anyway, I think keeping |
|
Pods and Brokers is apples/oranges. I cannot create a Trigger without a Broker. Could Kubernetes have forced folks to pre-create SAs? Yes. Frankly that likely costs the system more than what we're doing since it involves storing and rotating auth (used or not). |
|
I'm going to close this, as it's no longer correct. As we shift toward MT as the default we should revisit this as it's a strictly better DX in my experience with it thus far. |
This work is happening here: knative/eventing#2778