-
Notifications
You must be signed in to change notification settings - Fork 425
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add kubeadm configs, load balancer, public IP, refactor actuators, types #88
Conversation
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: justaugustus The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
5efc160
to
1fcc668
Compare
Signed-off-by: Stephen Augustus <saugustus@vmware.com>
Signed-off-by: Stephen Augustus <saugustus@vmware.com>
b711d57
to
fad8799
Compare
Signed-off-by: Stephen Augustus <saugustus@vmware.com>
@@ -33,7 +33,7 @@ | |||
"value": "Standard_B2ms" | |||
}, | |||
"location": { | |||
"value": "eastus" | |||
"value": "eastus2" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I am really a westus2
person :P
"value": "eastus2" | |
"value": "westus2" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Heh. This file is actually from the older implementations of capz.
We never copy this into the cluster-api-azure-controller
, so I'll delete it.
|
||
pip, err := pipsvc.GetPublicIPAddress(scope.ClusterConfig.ResourceGroup, resources.GetPublicIPName(machine)) | ||
pip, err := pipSvc.CreateOrUpdatePublicIPAddress(scope.ClusterConfig.ResourceGroup, resourcesSvc.GetPublicIPName(machine)) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The more that I think about this, I have a preference towards naming this EnsurePublicIPAddress
. Thoughts?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Still sticking to my comment above 😛 :#88 (comment)
I initially had this as
CreateOrGetPublicAddress
with separate logic for each, but we actually always want to reconcile it (update DNS name label, etc.), so I changed the method name.I thought about
EnsurePublicIPAddress
, because it's similar to the usage incloud-provider-azure
, but decided onCreateOrUpdate
, because it's more inline with the underlying Azure call (s.scope.PublicIPAddresses.CreateOrUpdate
).
) | ||
|
||
// ReconcileResourceGroup reconciles the resource group of the given cluster. | ||
func (s *Service) ReconcileResourceGroup() (err error) { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Not sure if there is a ResourceGroup equivalent in AWS. But I personally feel we shouldn't be using the Resource Group abstractions at all. (This is just my opinion though and not representative of Azure). As we are experimenting with the possibilities of VNet peering (using inter-resource-group Vnets), this could prove to be problematic. Definitely open to discussing this in detail in the future.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@awesomenix FYI. Let me know If I may have expressed anything incorrectly here.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
AFAIK, AWS doesn't have an equivalent abstraction like resource group.
In the pre-refactor capz (v0.1.0-alpha.1
), we're still creating resource groups; it's just happening in the deployment template as opposed to handled in the code.
I can see a future where we may allow multiple resource groups, say, to separate network from compute resources, but in the near-term, and definitely for this PR, we need to be able to handle them.
A huge benefit of having everything scoped to a single RG, especially at this stage of maturity for capz, is that cleanup is as simple as destroying the RG.
Co-Authored-By: justaugustus <justaugustus@users.noreply.github.com> Signed-off-by: Stephen Augustus <saugustus@vmware.com>
@tariq1890 / @soggiest -- this is ready for a final sweep. |
/lgtm |
FrontProxyCAKeyPair KeyPair `json:"frontProxyCAKeyPair,omitempty"` | ||
|
||
// SAKeyPair is the service account key pair. | ||
SAKeyPair KeyPair `json:"saKeyPair,omitempty"` |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm wondering if it would make sense to publish these external to the AWS/Azure providers and import them into both?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Maybe add them to cluster-api itself, rather than in the provider? Makes sense, since certs are provider agnostic as far as I'm aware.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Long term, yes. Shorter term, we can stage in a separate repo.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Agreed that we should eventually pull the reusable pieces into capi proper.
@detiber -- the version reversion was intentional. I retagged and released the existing versions ( Once we hit a place where |
What this PR does / why we need it:
Which issue(s) this PR fixes (optional, in
fixes #<issue number>(, fixes #<issue_number>, ...)
format, will close the issue(s) when PR gets merged):Fixes #
Special notes for your reviewer:
Please confirm that if this PR changes any image versions, then that's the sole change this PR makes.
Release note: