-
Notifications
You must be signed in to change notification settings - Fork 917
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Umbrella] [Karmada config && certificates] secret and path naming convention #6051
Comments
/help |
@chaosi-zju: Please ensure the request meets the requirements listed here. If this request no longer meets these requirements, the label can be removed In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
Hi @chaosi-zju , could I work on the karmada-operator update in task one? |
Of cource, welcome ! the sub task is assigned to you~ |
Can I work on this? |
Of cource you can! We very much welcome community partners to participate in. What sub task you would like to do first? |
Let me take the operator one |
the operator in task one has already assgined to so, I will assign the operator in task two for you, ok? |
Sure |
ok, thanks! actually, in this sub task we need to do just two things:
If you have any questions, feel free to ask me, or refer to #5423, best wishes. |
Task one. [Karmada Config] secret and path naming convention
Naming convention:
${karmada_instance_name}-${component}-config
karmada-config
/etc/karmada/config
karmada.config
Needed PRs:
Examples:
Karmada config
1. karmada-aggregated-apiserver
2. karmada-controller-manager
3. karmada-scheduler
4. karmada-descheduler
5. karmada-metrics-adapter
6. karmada-search
7. karmada-webhook
8. kube-controller-manager
Task two. [Karmada Certificate] secret and path naming convention
Naming convention:
Server Certificate:
${karmada_instance_name}-${component}-cert
server-cert
/etc/karmada/pki/server
ca.crt
、tls.crt
、tls.key
Client Certificate:
${karmada_instance_name}-${component}-${server}-client-cert
${server}-client-cert
/etc/karmada/pki/${server}-client
ca.crt
、tls.crt
、tls.key
Needed PRs:
Examples:
karmada certificates
1. karmada-etcd
2. karmada-apiserver
3. karmada-aggregated-apiserver
4. karmada-scheduler
5. karmada-descheduler
6. karmada-scheduler-estimator
7. karmada-metrics-adapter
8. karmada-search
9. karmada-webhook
10. kube-controller-manager
11. karmada-interpreter-webhook-example
Legacy issue
karmada-scheduler-config
(following the${component}-config
convention). However, a few users expressed the need to install two Karmada instances within the same namespace, which result in two sets of secrets, preventing us from establishing a fixed secret name.Resolution: in
helm
oroperator
, component name is prefixed with karmada_instance_name, likekarmada-xxx-scheduler
, so its secret name is defined as${karmada_instance_name}-${component}-config
cert_rotation_controller
ofkarmada-agent
has hard-coded karmada config secret name, so if we rename the secret name ofkarmada-agent
, it would affect the upgrade ofkarmada-agent
.karmada/pkg/controllers/certificate/cert_rotation_controller.go
Lines 59 to 60 in ce41488
Resolution: this time the
karmada-agent
is not involved, only the control-plane components is changed.The text was updated successfully, but these errors were encountered: