-
Notifications
You must be signed in to change notification settings - Fork 0
fix: Nutanix CSI credentials Secret creation #34
Conversation
f59cb54
to
66121e7
Compare
bab3b56
to
ffeea76
Compare
b9c569c
to
6d09be8
Compare
ffeea76
to
ab52d33
Compare
Can you explain what this means? I don't think I quite understand. Can you show what a secret would look like? |
Yes @faiq , it would be something like this.
|
We ended up going with the CRS approach with @jimmidyson recommendation I think it makes sense to keep a consistent of delivering things to the workload cluster. However I do like a lot of your other changes |
I guess we could do the same with this Secret and create an embedded Secret on user's behalf, but I would like to discuss the overall approach with you and @jimmidyson again please. I'm not sure if we gain anything much with CRS for these, it ties us closer to CRS (even for addons that have a CAAPH strategy) and makes it more difficult to debug failures since we aren't able to push events to the Cluster object on failed CRS applies. |
The existing code created a ClusterResourceSet with the user provided Secret. However, that won't work unless that Secret has an embedded Secret in it.
ab52d33
to
764761c
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Great changes!
...-api-runtime-extensions-nutanix/templates/csi/nutanix/manifests/helm-addon-installation.yaml
Show resolved
Hide resolved
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM. nice improvement. Cleanup of the secret should be handled by CAREN in delete cluster hook in addition to uninstalling helm release.
The existing code created a ClusterResourceSet with the user provided Secret. However, that won't work unless that Secret has an embedded Secret in it.
Depends on dkoshkin/build-add-nutanix-csi-to-examples
The existing code created a ClusterResourceSet with the user provided Secret. However, that won't work unless that Secret has an embedded Secret in it. Keeping it simple and just creating the Secret using the remote client. This way we can bubble up errors to the Cluster object.
Used the example cluster files and was able to create a Pod with a PV (spec from konvoy e2e files)