-
Notifications
You must be signed in to change notification settings - Fork 25
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Run scrutinize in its own pod #706
Conversation
I am not sure about using the same serviceaccount and podsecuritycontext on verticapods and scrutinize pod. Were you planning for scrutinize to have its own? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This looks good. I deployed the new CR on my machine and it was able to run scrutinize just fine. It's pretty slick.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks great. I had a few minor suggestions but approving as I trust they will be applied.
if vinf.IsOlder(v1.ScrutinizeDBPasswdInSecretMinVersion) { | ||
ver, _ := s.Vdb.GetVerticaVersionStr() | ||
s.VRec.Eventf(s.Vscr, corev1.EventTypeWarning, events.VclusterOpsScrutinizePasswdInSecretNotSupported, | ||
"The server version %s does not support vclusterOps scrutinize reading db password from secret", ver) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can we shorten this to say it only runs with 24.2.0?
"The server version %s does not support vclusterOps scrutinize reading db password from secret", ver) | |
"The server version %s is not supported with VerticaScrutinize. The minimum server version it supports is %s.", ver, v1.ScrutinizeDBPasswdInSecretMinVersion) |
|
||
if vinf.IsOlder(v1.ScrutinizeDBPasswdInSecretMinVersion) { | ||
ver, _ := s.Vdb.GetVerticaVersionStr() | ||
s.VRec.Eventf(s.Vscr, corev1.EventTypeWarning, events.VclusterOpsScrutinizePasswdInSecretNotSupported, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Suggest we reuse the event. It all means the same thing, we don't support the deployment.
s.VRec.Eventf(s.Vscr, corev1.EventTypeWarning, events.VclusterOpsScrutinizePasswdInSecretNotSupported, | |
s.VRec.Eventf(s.Vscr, corev1.EventTypeWarning, events.VclusterOpsScrutinizeNotSupported, |
When a VerticaScrutinize resource is created, the operator:
PASSWORD_NAMESPACE
,PASSWORD_NAME
) to allow vcluster scrutinize to read the db password from secret.Once the pod is created, a new reconciler(
PodPollingReconciler
) will wait for scrutinize to finish and update status condition