-
Notifications
You must be signed in to change notification settings - Fork 189
Add controller publish secrets to default RBD/CephFS StorageClasses #3374
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Add controller publish secrets to default RBD/CephFS StorageClasses #3374
Conversation
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: iPraveenParihar The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
d39673f to
28f6a00
Compare
ControllerPublishVolume()`/`ControllerUnpublishVolume()` requires controller-publish-secret. The secret is needed to access the Ceph cluster for metadata/blocklist operations. The following parameters to be added in default RBD/CephFS StorageClasses created by ocs-operator. ``` csi.storage.k8s.io/controller-publish-secret-name csi.storage.k8s.io/controller-publish-secret-namespace ``` Signed-off-by: Praveen M <[email protected]>
28f6a00 to
8039102
Compare
|
@iPraveenParihar How about implementing the changes in ceph-csi first and later we can add the required parameters to the SC later? |
Since theses changes are not dependent, thought raising the PR for reviews. |
Even we might not need this change if we just update the csi configmap with the right secrets. If this PR gets merged first, not have the cephcsi PR merged on time. we might end up having extra secrets in the storageclass but not the functionality. |
|
@Madhu-1, since the ceph-csi PR is merged. Can we check on this? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
No harm in setting this one.
@iPraveenParihar if we set it in the Clientprofile CR, we dont need this change right? what is the benefit of setting it in both places?
@nb-ohad WDYT?
If the controller secrets are not present in StorageClass, then Ceph-CSI will attempt to fetch by making a k8s API call. Its just having controller-publish-secret{name|namespace} parameter in StorageClass, should not harm? |
If the secrets are present its the same. it will be fetched by the external attacher itself, i dont think it uses cache client. Does it uses cache client?
No harm, just waiting for confirmation, what i heard was the ODF has plan to move to configmap not to add more secrets to the storageclass. tagged Ohad to confirm on that one. |
My bad, I was assuming it uses cache client. Then it should be fine. |
|
PR needs rebase. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
Ceph-CSI will be implementing
ControllerPublishVolume()/ControllerUnpublishVolume()which requirescontroller-publish-secret from StorageClass. The secret is needed to access the Ceph cluster for [add|remove] metadata/blocklist operations.
The following parameters to be added in default RBD/CephFS StorageClasses created by ocs-operator.
Story: https://issues.redhat.com/browse/RHSTOR-7598