-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Best Practices: Should there be a section that talks about support k8s resources like configmap, secrets, PVs etc etc #6484
Comments
I'm talking about configmaps, secrets, PVs, node affinity, taints, TLS certs, maybe even other items like chaos monkey, being able to use telepresense, toplogy aware routing, limit ranges, resource quotas, controlling pod to node assignment, autoscaler? |
@alberttwong Thanks for raising this issue! I'm a little lost as to what kind of documentation you are looking to be added, would you mind elaborating a bit more about what content you would like to see for this topic? |
I would love to see also recommendations on what the operator should have in terms of capability. I've seen operators built without the ability to add configmaps or secrets or even using PVs or even supporting TLS certs. I'm afraid that many operators developers think that just using the SDK is enough to be called an "operator". |
@alberttwong We already have an operator capability model which decides on the level of maturity of an operator.
I believe what you are looking for is to mention the set of actions in terms resource limitations, network configurations, storage options etc so as to define an operator to be entirely stable and of the highest capability. To do so we already have a model defined which defines the list of functionalities an operator needs to implement for it to be considered matured (https://sdk.operatorframework.io/docs/overview/operator-capabilities/). For example, an operator being able to collect metrics and provide insights would be a level IV operator - the method in which it is implemented could be using prometheus and grafana or through any other 3rd party solution (say Sensu or Scope) |
Is there a technical validation test harness or just verbal suggestions? |
Issues go stale after 90d of inactivity. Mark the issue as fresh by commenting If this issue is safe to close now please do so with /lifecycle stale |
Stale issues rot after 30d of inactivity. Mark the issue as fresh by commenting If this issue is safe to close now please do so with /lifecycle rotten |
Rotten issues close after 30d of inactivity. Reopen the issue by commenting /close |
@openshift-bot: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
node affinity and taints, TLS certs.
The problem I see is that I see some operators don't support those options. I feel that it would have been better that they should have these configuration options in the v1 of their operator.
The text was updated successfully, but these errors were encountered: