-
Notifications
You must be signed in to change notification settings - Fork 40.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Proposal for federated API servers #17191
Proposal for federated API servers #17191
Conversation
Labelling this PR as size/L |
GCE e2e test build/test passed for commit 16be0afaaa7178c5bb40def6963dadfe2e21da76. |
|
||
## Caveats | ||
|
||
* Resources can have same uid: kubectl users, for example, can get 2 resources |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
UUIDs are supposed to be unique in space and time. This should not be true or we are doing something wrong.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think we're continuing to say "we do not coordinate to ensure uids are unique across resource types" - clients should not assume that a uid has any meaning outside of its resource.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
removed
Reading through the comments, I see 2 high level discussion points:
The current proposal was written assuming
WDYT? |
I would expect that to be true
I would not expect that to be true |
What @liggitt said. Really do not want multiple apiservers per group. As far as validation-- I think only need to validate that the group(s) being registered are unique. If the other apiservers don't actually work, that's not our problem. |
ok some notes based on IRL discussion with @lavalamp
|
0fc707a
to
87a2adb
Compare
Added a "Running on hosted kubernetes cluster" section. |
GCE e2e test build/test passed for commit 87a2adb868a4e03baafd6574909bd91611e0eeba. |
## High Level Architecture | ||
|
||
There will be 2 new components in the cluster: | ||
* A smiple program to summarize discovery information from all the servers. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
nit: s/smiple/simple
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Fixed.
87a2adb
to
4d948ce
Compare
Thanks for the review @roberthbailey |
GCE e2e test build/test passed for commit 4d948ce79d49c6222e41b7da453ce2591a3e307b. |
@nikhiljindal - I spoke with @lavalamp and am delegating my lgtm to him. |
provide a lot more functionality like: rate-limiting, caching, logging, | ||
transformations and authentication. | ||
In future, we can also use ingress. That will give cluster admins the flexibility to | ||
easily swap out the ingress controller by a Go reverse proxy, ngingx, hapraoxy |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
nit: praoxy -> proxy
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Fixed
Just a few nits. Then I think this is close enough that we can merge and iterate from there. |
4d948ce
to
094e537
Compare
Thanks for the comments @lavalamp. |
GCE e2e test build/test passed for commit 094e537. |
This is Lgtm |
Automatic merge from submit-queue |
Auto commit by PR queue bot
\o/ |
Auto commit by PR queue bot
Proposal for #16558
cc @kubernetes/goog-csi @lavalamp @smarterclayton @erictune @bgrant0607 @brendandburns