Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feature: install submariner broker and globalnet config on hub cluster #231

Closed

Conversation

SataQiu
Copy link
Contributor

@SataQiu SataQiu commented Dec 3, 2021

Signed-off-by: SataQiu shidaqiu2018@gmail.com

/cc @sridhargaddam

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Dec 3, 2021

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:
To complete the pull request process, please assign tpantelis after the PR has been reviewed.
You can assign the PR to them by writing /assign @tpantelis in a comment when ready.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Dec 3, 2021

Hi @SataQiu. Thanks for your PR.

I'm waiting for a open-cluster-management member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@sridhargaddam
Copy link
Contributor

/ok-to-test

Signed-off-by: SataQiu <shidaqiu2018@gmail.com>
@sonarcloud
Copy link

sonarcloud bot commented Dec 6, 2021

Kudos, SonarCloud Quality Gate passed!    Quality Gate passed

Bug A 0 Bugs
Vulnerability A 0 Vulnerabilities
Security Hotspot A 0 Security Hotspots
Code Smell A 0 Code Smells

No Coverage information No Coverage information
No Duplication information No Duplication information

@SataQiu
Copy link
Contributor Author

SataQiu commented Dec 6, 2021

Hi @sridhargaddam

Could you please take a look?

@sridhargaddam
Copy link
Contributor

Hi @sridhargaddam

Could you please take a look?

Sure @SataQiu. I'll take a look at the PR tomorrow. Thanks.

@sridhargaddam
Copy link
Contributor

sridhargaddam commented Dec 6, 2021

Hi @sridhargaddam

Could you please take a look?

Hello @SataQiu, May I know how you are testing this feature? Are you using KIND or ACM GUI?
If it's KIND, what are the steps?

DefaultCustomDomains: nil,
GlobalnetCIDRRange: "242.0.0.0/8",
DefaultGlobalnetClusterSize: 65536,
GlobalnetEnabled: false,
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I manually modified this to "true" and wanted to verify if globalnet is getting deployed with KIND Clusters (i.e., make images, make clusters and make demo). However, globalnet is not deployed.

Also, broker-globalnet-cm as well as broker objects are not created on the broker cluster.

Can you please let us know how you are testing this change?

GlobalnetEnabled: false,
}

if v, ok := clusterSet.Annotations[brokerComponentsAnnotationKey]; ok {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@skitt @tpantelis do you have any feedback on this approach of using annotations on the ManagedClusterSet object to enable certain features?

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't know if this is a recommended approach and if other apps do it. For the submariner install on the managed clusters, we have a SubmarinerConfig CRD to communicate the user config so perhaps we should create an equivalent BrokerConfig CRD to be consistent.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm hesitant about this place, too.
If BrokerConfig is a more acceptable solution, I can try it. @tpantelis @sridhargaddam

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

yeah let's try that. We don't own the ManagedClusterSet so our annotations could cause extraneous updates for others and possibly get overwritten.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ideal way to create Broker on hub cluster is to install submariner-operator on the hub cluster and let the operator handle broker creation. submariner is created in the spoke in the similar fashion.

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

yeah it seems like we should be able to use the Broker CRD and install the submariner-operator.

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Dec 16, 2021

@SataQiu: PR needs rebase.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants