-
Notifications
You must be signed in to change notification settings - Fork 2.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Consider using ArgoCD to manage cluster state instead of kubectl
#29033
Comments
Eh, I greatly prefer the visibility of seeing exactly what manifests we're deploying checked into the repo and the ability to git revert those versus depending on external charts. You will find that the Kubernetes organization very rarely has anything helm related. If we need to template things, we prefer declarative patches (e.g. kustomize). Lack of prune is a valid issue, though rarely encountered. Moving to plain kubectl vs rules_k8s is a recent move that has not addressed this.
I'm not sold that we should be deploying this in k8s prow yet tbh. Mutating admission webhooks should generally be avoided and are not the only way we can accomplish using mirrors. EKS supports configuring containerd AFAIK we can relatively easily inject mirror config at the node level instead, which is generally a safer approach. Currently aside from prow itself we depend on Grafana and ESO in the services cluster. These relatively rarely require updates. |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close not-planned |
@k8s-triage-robot: Closing this issue, marking it as "Not Planned". In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
We are deploying rather complicated applications to the prow-build clusters and would benefit greatly from using ArgoCD to deploy apps that are bundled as Helm charts instead of manually generating a yaml file from Helm chart.
I already do this today for the prow clusters that I managed for knative:
kubectl
knative/test-infra#3363 argocd vs kubectlA list of apps that we plan on running on K8s clusters:
/sig testing
/sig k8s-infra
The text was updated successfully, but these errors were encountered: