-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SPI Kubernetes infrastructure #5908
Comments
I think |
Here is a list of things I think we should implement:
@garagatyi I planned to work on that too next sprint and we may work together on these tasks wdyt? @gorkem maybe you meant |
We can share these tasks, sure. But this is probably needed to be decided on a teams level to achieve better utilization of resources of teams. @skabashnyuk WDYT? |
@l0rd I think |
There's a certified conformance program if you're looking for a "standard Kubernetes": https://github.com/cncf/k8s-conformance heptio/buoy checks clusters against a checklist, might help here. Could use the rule "where heptio/buoy passes, this should work" |
@andrewhowdencom sorry, I didn't get what issue suggested solution is supposed to solve, can you elaborate? |
It was my understanding that there was some notion of defining what a suitable test environment for the API work for che should be. To determine in what environments Kubernetes is supposed to work, you could use the guideline "Does it adhere to the Kubernetes Conformance guidelines". In this case, it would not rather be The point about heptio/buoy was to resolve any ambiguity whether it should be some handling built in to che to handle ambiguity between k8s environments (for example, rbac here and not there, or alpha features being enabled). The goal being "Che should operate in environments in which buoy indicates there are no issues": Reference: https://github.com/heptio/sonobuoy If I misread this, I'm sorry <3 I was just trying to pass on information that I thought may be useful. I'm excited to see this work completed! |
@andrewhowdencom thank you for the explanation. Not sure we need to test environment for the compatibility with k8s TCK. Anyone can correct me if I missed something. |
@garagatyi I think the question is what kubernetes platform/distribution should we test Che SPI against. There are over 50 of those nowadays and we can not test them all. @andrewhowdencom Thanks for bringing up |
So, @garagatyi and I did some investigation and work on Kubernetes infrastructure. Today we have a branch with Kubernetes infrastructure. There are few more pieces of stuff that required to be reworked a bit. PR will be created soon. OpenShift infrastructure extends Kubernetes and supports The list of tasks what is left to do is in the issue description. |
So, PR with k8s infrastructure is merged.
|
Update:
|
Not sure this is the right thread, but I'm trying to to deploy Eclipse Che on Docker EE 2.0 Kubernetes cluster (and also Azure AKS), but docs explaing only minikube conf: any documentation expecially for networking configuration to access Eclipse Che services (some trouble for me to configure che-ingress)? |
@carloreggiani you can use the Helm Chart https://github.com/eclipse/che/blob/master/deploy/kubernetes/helm/che/readme.md |
It was my firts try, @l0rd, but I'm trying to understand how to configure on Docker EE kubernetes the RBCA prerequisite steps (I'm connected ad admin user to the cluster):
|
@l0rd I think we can close this issue now. WDYT? |
Closing the issue since it is already implemented. |
Currently only Docker and OpenShift infrastructure have been implemented. Once OpenShift infrastructure is mature enough we should extract the Kubernetes parts and make a new infrastructure. OpenShift infrastructure should be an extension of Kubernetes.
minikube
As a workaround added an ability to configure context security for pods. Setting runAsUser and FsGroup to 0 fixes issue on
minikube
.Kubernetes
infrastructure by adding an ability to configure ingresses implementation (nownginx
is hardcoded)Kubernetes
infrastructure by adding an ability to configureTLS
for ingresseskubernetes
recipeskubernetes
infrastructureMaybe we need minikube addon for CheKubernetes
infrastructure by adding an ability to set hostname for ingresses (hostname based single port)Pods
. Check whether it is a problem and disable mounting of the token if it is possibleThe text was updated successfully, but these errors were encountered: