Replies: 11 comments
-
Thanks for opening this issue 👍. The team will review it shortly. If this is a bug report, make sure to include clear instructions how on to reproduce the problem with minimal reproducible examples, where possible. If this is a security report, please review our security policy as outlined in SECURITY.md. If you haven't already, please take a moment to review our project's Code of Conduct document. |
Beta Was this translation helpful? Give feedback.
-
This will require granting the Kanister controller RBAC permissions to retrieve blueprints, actionsets, profiles etc. from other namespaces, which may not work for some users. Can you share more information on your setup and use cases as to why it's desirable to deploy blueprints to other namespaces? |
Beta Was this translation helpful? Give feedback.
-
Hi @ihcsim, it's simply the way I'm trying to manage the source code, I want mysql-blueprint to placed in same group of mysql application, same as mysql-profile. While profile of specific app can be placed in other namespaces but blueprint of the same app cannot? Hope that make sense. Thanks. |
Beta Was this translation helpful? Give feedback.
-
When we look into this, we need to be sure that this doesn't give a path for privilege escalation. Also, we currently have the ability to run multiple Kanister installations in the same cluster, need to look at which Kanister install would be looking at namespaces, could be an option in the Kanister install for which namespaces it looks at. Default could continue to be the namespace it is installed in, "*" for all namespaces or a list. |
Beta Was this translation helpful? Give feedback.
-
We should re-evaluate the current pod service account model. See #1550. I find supporting the upgrade path of a multi-installation model hard to reason about, especially, for cluster-scoped resources. Feels like we should re-visit our multi-tenancy story. |
Beta Was this translation helpful? Give feedback.
-
This issue is marked as stale due to inactivity. Add a new comment to reactivate it. |
Beta Was this translation helpful? Give feedback.
-
This issue is closed due to inactivity. Feel free to reopen it, if it's still relevant. |
Beta Was this translation helpful? Give feedback.
-
After a short discussion on slack, I would like to reopen this issue. I would like to use Kanister in the following setting/environment:
Currently this would only be possible by deploying a kanister-operator in every namespace which would not be a good solution. Problem would be solved if Kanister would scan for Blueprint/ActionSet-Resources in selectable/all namespaces. |
Beta Was this translation helpful? Give feedback.
-
Migrating my question from Slack to here: I'm trying to apply Kanister for my home cluster backups, and the model makes sense to me with one big exception: it seems to me that Blueprints and ActionSets related to specific applications have every reason to live in the same namespace with that application, but it doesn't seem like Kanister supports that, nor has a clear "happy-path" for me. In my case, applications are deployed by Terraform modules into dedicated namespaces, and all domain-specific knowledge about each application is captured in its module. Having to put Kanister resources in a different namespace will require each module to encode knowledge about how I have Kanister deployed (that is, which namespace), rather than simply using its CRDs. (Actually, that's assuming that I can have ActionSets in the Other operators (such as cert-manager) operate by default in all namespaces, and so feel somewhat like native extensions to Kubernetes -- as an application owner, I don't need any particular knowledge about the With Kanister, I'm not quite sure what the Right Way™ looks like for me. With no knowledge of the code base, if I could snap my fingers and adjust the architecture, I would take inspiration from the Gateway API's multiple-personas model. That is, there are:
This earlier comment brings up RBAC concerns. I can certainly imagine organizations where Kanister's current model makes more sense, but if I were in an organization with such controls, I'd be leery of relying on the Helm chart's bundled RBAC in any case. I'd probably supply my own RBAC limited to the one or more namespaces I expected Kanister to operate in, rather than deploy Kanister once for each namespace. Anyhow, I'd really appreciate some insight from others on how Kanister might apply to a situation like mine, and whether there's already a "happy path." |
Beta Was this translation helpful? Give feedback.
-
Hi @alexander-bauer, |
Beta Was this translation helpful? Give feedback.
-
The issue was added to the roadmap e6006ce |
Beta Was this translation helpful? Give feedback.
-
Is your feature request related to a problem? Please describe.
It's not actually a problem, I just want to create a blueprint on a different namespace with kanister operator
Describe the solution you'd like
By default as I tested the examples, if the kanister-operator was installed in kanister namespace, then the blueprint must also be installed in the kanister namespace. Otherwise, the event of profile will show "none" after created.
Describe alternatives you've considered
Now I want kanister to support for creating the blueprint in another namespace, like I want to create mysql-blueprint in mysql-test namespace, or postgresql-blueprint in postgres-test namespace.
Environment
Kubernetes Version/Provider: All
Storage Provider: .All
Cluster Size (#nodes): Any
Data Size: Any
Additional context
No
Beta Was this translation helpful? Give feedback.
All reactions