-
Notifications
You must be signed in to change notification settings - Fork 38
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Provide the component config #55
Comments
/assign |
The component-config is deprecated and will be removed. So we should hold similar schemes as component-config in this repository. |
Maybe, I don't have enough time to work on this. /unassign |
I can take it up. do you have any idea on how to implement it or any examples that I can refer to? @tenzen-y |
can you be more specify about the ref and implement? I think adding this feature will require us to use code-gen to gen the file and implement the function. then there comes a the key question is: do we actually need this? and are there any more scenes that might need this api/feature?(beside internal-cert and cert manager) @tenzen-y also /cc @ahg-g for advice |
see https://book.kubebuilder.io/component-config-tutorial/tutorial.html
|
If we introduce the component config, we can set up many parameters for the controller besides the cert. Note: ComponentConfig is deprecated. So we must implement all features of the https://github.com/kubernetes-sigs/controller-runtime/tree/30dea34848b0e0b30690dd461a0eadb74d4869f3/pkg/config in this repo. |
thanks for the heads up, the files said user need to migrate to their own. what it means is that we need to copy the struct to our own repo's codebase or we implement it in some other ways? @tenzen-y |
Yes, you're right. |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/lifecycle frozen |
@charles-chenzz I assume you aren't working on this anymore so i'm going to unassign it, but if you want to implement this please feel free to reassign. |
/assign |
@tenzen-y only implement cert management in this issue? |
apiVersion: config.jobset.x-k8s.io/v1alpha1
kind: Configuration
namespace: jobset-system
health:
healthProbeBindAddress: :8081
metrics:
bindAddress: :8080
leaderElection:
leaderElect: true
webhook:
port: 9443
clientConnection:
qps: 50
burst: 100
internalCertManagement:
enable: false
webhookServiceName: ""
webhookSecretName: "" The basic configuration, same as kueue? leaderElection:
leaderElect: true
resourceName: c1f6bfd2.jobset.x-k8s.io Do we need to change the leaderelectionid? |
I assumed that we could provide a similar functionality as Kueue. |
Generally, looks great. |
I would like to provide the component config like kueue: https://github.com/kubernetes-sigs/kueue/blob/9ca57c86cf06c11a94a2d5b7badf60233a51a2f2/config/components/manager/controller_manager_config.yaml
Maybe, as a first step, we can provide the functionality for users to select whether to use the internal cert or the cert-manager.
/kind feature
ref: #52
The text was updated successfully, but these errors were encountered: