Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Discuss how kubeadm should deploy critical addons #33961

Closed
mikedanese opened this issue Oct 3, 2016 · 8 comments
Closed

Discuss how kubeadm should deploy critical addons #33961

mikedanese opened this issue Oct 3, 2016 · 8 comments
Labels
area/kubeadm sig/cluster-lifecycle Categorizes an issue or PR as relevant to SIG Cluster Lifecycle.

Comments

@mikedanese
Copy link
Member

It's important for kubeadm to deploy critical addons because we want users to have a functioning cluster after the process completes. The current implementation is an new addon management solution which does not align with the larger goals for the addon manager.

cc @kubernetes/sig-cluster-lifecycle

@luxas luxas added sig/cluster-lifecycle Categorizes an issue or PR as relevant to SIG Cluster Lifecycle. area/kubeadm labels Oct 3, 2016
@luxas
Copy link
Member

luxas commented Oct 3, 2016

Which addons except dns belongs to this group?
dashboard and heapster?

Should the process be to opt in (kubeadm init --addons=dashboard,heapster) or opt-out (kubeadm init --exclude-addon heapster) in your mind?

@bprashanth
Copy link
Contributor

I think the problem is broader than just deployment. I want priority on pods (nice) that kicks in even when they get vertically autoscaled. If there're finite resources on nodes, I want them allocated to the most important pods, even if this means evicting lower priority pods. Does the deployment problem solve itself with such a system?

@mikedanese
Copy link
Member Author

Which addons except dns belongs to this group?

kube-proxy, heapster, maybe dashboard

We should fix addon deployment in general and use that solution rather than inventing yet another.

@colemickens
Copy link
Contributor

Sorry to rehash this since I've had this conversation a couple times in ephemeral Slack contexts... but what are the arguments against kube-cert-manager? It was suggested as an option for our use, but I hesitated because I knew there were reservations... but I don't recall them well enough to argue for/against it's use.

@luxas
Copy link
Member

luxas commented Oct 3, 2016

xref my proposal earlier: #23233 (comment)

@justinsb
Copy link
Member

justinsb commented Oct 4, 2016

Check out channels, which is how I've avoided the problems of kube-addons: https://github.com/kubernetes/kops/tree/master/channels

It depends on your work on getting prune to work in kubectl apply @mikedanese (or will do!), but it also adds a few things for a better UX:

  1. a meta-manifest for an addon, listing the various available versions (https://github.com/kubernetes/kops/blob/master/addons/kubernetes-dashboard/addon.yaml)
  2. a when you install an addon, we record the version you have installed and the source (currently as an annotation on the namespace)
  3. this means if you edit the addon, we won't immediately undo your changes (I'm looking at you, kube-addons), even if run in a cron-job
  4. we also can prompt you to upgrade your addons when a new version comes out

I think we should aim to replace the kube-addons container in 1.5 with something like this. I was planning on working on it anyway - want to team up @mikedanese ? I think kubeadm should call into it, but there is much wider appetite for this (and for starting to build a repository of addons). Of course if it's all go code it can be a standalone tool and part of kubeadm.

@bgrant0607 bgrant0607 added sig/cluster-lifecycle Categorizes an issue or PR as relevant to SIG Cluster Lifecycle. and removed sig/cluster-lifecycle Categorizes an issue or PR as relevant to SIG Cluster Lifecycle. labels Oct 7, 2016
@errordeveloper
Copy link
Member

Current implementation is there only because there was not concrete proposal at the time. There are several ideas floating around, let's make sure we settle on something soon.

@mikedanese
Copy link
Member Author

This issue was moved to kubernetes/kubeadm#62

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/kubeadm sig/cluster-lifecycle Categorizes an issue or PR as relevant to SIG Cluster Lifecycle.
Projects
None yet
Development

No branches or pull requests

7 participants