-
Notifications
You must be signed in to change notification settings - Fork 14
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Expose Status machine adresss ip #223
Conversation
@outscale-hmi @outscale-mdr are you ok with this pr ? |
cloud/tag/tag.go
Outdated
@@ -28,7 +28,7 @@ import ( | |||
) | |||
|
|||
// AddTag add a tag to a resource | |||
//func AddTag(tagKey string, tagValue string, resourceIds []string, api *osc.APIClient, auth context.Context) (error, *http.Response) { | |||
// func AddTag(tagKey string, tagValue string, resourceIds []string, api *osc.APIClient, auth context.Context) (error, *http.Response) { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
you should rebase,
this change is in several PR
also AddTag in the comment parameters don't have the same parameters
as AddTag(createTagRequest osc.CreateTagsRequest, resourceIds []string, api *osc.APIClient, auth context.Context) (error, *http.Response)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ok remove
@@ -921,8 +925,10 @@ func (network *OscNetwork) SetSecurityGroupDefaultValue() { | |||
if network.ClusterName != "" { | |||
securityGroupRuleApiKubeletKwName = strings.Replace(DefaultSecurityGroupRuleApiKubeletKwName, DefaultClusterName, network.ClusterName, -1) | |||
securityGroupRuleApiKubeletKcpName = strings.Replace(DefaultSecurityGroupRuleApiKubeletKcpName, DefaultClusterName, network.ClusterName, -1) | |||
securityGroupRuleNodeIpKwName = strings.Replace(DefaultSecurityGroupRuleNodeIpKwName, DefaultClusterName, network.ClusterName, -1) | |||
securityGroupRuleNodeIpKcpName = strings.Replace(DefaultSecurityGroupRuleNodeIpKcpName, DefaultClusterName, network.ClusterName, -1) | |||
securityGroupRuleKwNodeIpKwName = strings.Replace(DefaultSecurityGroupRuleKwNodeIpKwName, DefaultClusterName, network.ClusterName, -1) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is this change related to expose machine address ip ?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We need to expose machine address ip but there are also some ports are missing for microk8s.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
(Open missing flux)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
OK for me
What type of PR is this?
/kind feature
What this PR does / why we need it:
Expose node ip address for machine in status (which is used by microK8s bootstrapper)
Open missing flux
And add example for microk8s.
Closes #222
Which issue(s) this PR fixes :
Fixes #222
Special notes for your reviewer:
Optional addresses
https://cluster-api.sigs.k8s.io/developer/architecture/controllers/machine.html
TODOs: