ConfigMap / Secret Orchestration#948
Conversation
This change adds a KEP for ConfigMap / Secret Orchestration support. Signed-off-by: Kevin Fox <Kevin.Fox@pnnl.gov>
|
Hi @kfox1111. Thanks for your PR. I'm waiting for a kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Signed-off-by: Kevin Fox <Kevin.Fox@pnnl.gov>
|
/ok-to-test |
Signed-off-by: Kevin Fox <Kevin.Fox@pnnl.gov>
|
|
||
| Both will default to false for compatibility. | ||
|
|
||
| snapshot can be either true or false. Watch can only be true if snapshot is also true. This ensures immutability. |
There was a problem hiding this comment.
Can you elaborate a bit more on "snapshot" field? What scenarios would use it? Why not just use the given ConfigMap?
There was a problem hiding this comment.
you may have things that should be snapshotted, and some things that should not. For example, say you have two secrets. One contains immutable, sensitive configuration stored in a secret (say a mysql connection string with a password). This should be marked snapshot and should not be dynamically updated out to the pod. There may be another secret though that must be updateable (for example, a cert-manager managed certificate) that you always want the newest version as the older version is no longer valid. Having a flag at the volume level allows choosing.
The only determination between choosing a configmap and a secret is how sensitive the material is.
There was a problem hiding this comment.
Why does watch require snapshot to be true? Also, wouldn't it make more sense to opt into this on workload-level (Deployment, DS, Statefulset) because if immutability is wanted, we already have the immutable configmap/secret fature?
There was a problem hiding this comment.
I'm not super excited about this, I left some comments. This needs a better API design and a GC plan to have a chance.
I'm not excited by the temporal dependencies this introduces -- the system will do different things depending on the update order between a deployment and a configmap. If you update both in a short amount of time it's particularly unclear what would happen.
I feel like the controller changes to implement this would be fairly complex. I recommend dropping the "watch" flag completely; users can touch the object with a no-op PATCH for a rollout on-demand, add that feature in a separate step.
It really was a first stab at a kep. Open to changes.
Maybe watch in addition to snapshot is biting off too much at once. It was a primary use case of the initial issue though so thought I should include it. Often KEP's don't go through unless they cover a lot of use cases it feels like. I think if I remove it someone would probably ask for it back.
|
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
|
/remove-lifecycle stale |
|
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
|
/remove-lifecycle stale |
|
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
|
/remove-lifecycle stale Yeah, everyone should be notified that no body cares about this issue for the last 90d. |
|
@Bessonov We need a broken heart reaction. 💔 |
|
If I'm right, we'd need to open an issue for the enhancement before we can merge this PR. |
|
Ah no, we have it. #3704 |
|
The Kubernetes project currently lacks enough contributors to adequately respond to all PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
|
/lifecycle frozen |
|
@adampl: The DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
The Kubernetes project currently lacks enough active contributors to adequately respond to all PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
|
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close |
|
@k8s-triage-robot: Closed this PR. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
/reopen |
|
@Bessonov: You can't reopen an issue/PR unless you authored it or you are a collaborator. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
/reopen |
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: kfox1111 The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
|
@alvaroaleman: Reopened this PR. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
@alvaroaleman: The DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
@kfox1111: The following test failed, say
Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
|
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close |
|
@k8s-triage-robot: Closed this PR. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
This bot needs to die. |
|
@Bessonov: You can't reopen an issue/PR unless you authored it or you are a collaborator. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
@kfox1111 can re-open it if they are still pursuing this. The issue here is not the bot closing a PR, it is that there is no consensus on this design. Specifically at least sig-apps and probably sig-apimachinery would need to agree on it. Sig-Apps meetings are biweekly on Mondays. I also suggest you folks follow kubernetes/kubernetes#22368 rather than this, the k/k issue tracks the problem, this PR is a proposed but not agreed-upon solution. |
Yes this is still desired |
This change adds a KEP for ConfigMap / Secret Orchestration support.
Related to: #3704