-
-
Notifications
You must be signed in to change notification settings - Fork 318
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
First ovh working iteration #100
Conversation
First, our email conversation did not green light ovh inclusion. Writing the module isn't the issue, its the maintenance, validation, testing, and support that goes into each platform, for Typhoon releases, for the foreseeable future. You can read the same answer given to VMWare vSphere. Adding more platforms is far out on the roadmap and when that time comes maintainers I know and trust from different cloud providers may be brought onboard. I thought I was clear in email, but I apologize if not. Next, Openstack is explicitly called out as a non-goal in the project. As I said in email. Taking a quick glace at the PR, I have so many issues with this implementation:
OVH is welcome to create its own Terraform modules in its own repos. Please don't imply Typhoon is endorsing or affiliated. |
Closing as this is far away from something I'd accept and I don't want to give false hope it is mergeable. |
hi @dghubble firstly, lots of issues you're mentionning are definitely not intended to last. i'm in a big WIP, but as i was at a point in time where i had to be sure if it would have a chance to be "hosted in typhoon repo", whatever the efforts needed to comply with typhoon's design considerations. Somehow, you could have decided to created some kind of an "unofficial & unsupported external providers" leaving the core of your project clean. As it doens't seem to be the case for the moment, that leaves me with the other option, which is host our own repo, and eventually take other designs decisions and deal with our missing features in a more appropriate way. because if you're not satisfied with some dirty shortcuts i've made, i'm not either. lastly, i'd still like to mention typhoon somehow, not as an "affiliated" or "endorsed" project, but if you don't want that either, then i won't. we'll took no offense. regards yann |
* Fix a regression caused by lowering the Kubelet TLS client certificate to system:nodes group (#100) since dropping cluster-admin dropped the Kubelet's ability to delete nodes. * On clouds where workers can scale down (manual terraform apply, AWS spot termination, Azure low priority deletion), worker shutdown runs the delete-node.service to remove a node to prevent NotReady nodes from accumulating * Allow Kubelets to delete cluster nodes via system:nodes group. Kubelets acting with system:node and kubelet-delete ClusterRoles is still an improvement over acting as cluster-admin
* Fix a regression caused by lowering the Kubelet TLS client certificate to system:nodes group (poseidon#100) since dropping cluster-admin dropped the Kubelet's ability to delete nodes. * On clouds where workers can scale down (manual terraform apply, AWS spot termination, Azure low priority deletion), worker shutdown runs the delete-node.service to remove a node to prevent NotReady nodes from accumulating * Allow Kubelets to delete cluster nodes via system:nodes group. Kubelets acting with system:node and kubelet-delete ClusterRoles is still an improvement over acting as cluster-admin
Hi @dghubble
as mentioned in dec emails
i've worked on porting typhoon to the openstack impl of OVH cloud
here's a first working iteration.
My primary obj is to push it soon in the terraform registry.
Either i create a repo on ovh's github org, and mention typhoon in the README
or maybe we can work out toghether how to make it upstream if ever it 's something you would like to
anyway, whatever you decide, if i can get any feedback on this module, it would be great.
Note: i've converted cl provider configs to ignition provider config