-
Notifications
You must be signed in to change notification settings - Fork 828
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Convert gcsweb to VPC native LB #2080
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I did this the scary way. Apparently there's a safer way when we do others.
A few non-blocking questions, since this is live:
- why?
- was the scary way applying these changes all once? or were there some steps involved?
- is there a link to the safer way?
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: spiffxp, thockin The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Verified via # $ k --context=aaa get services -n gcsweb -o=yaml \
# | yq -y '.items[] | {annotations: (.metadata.annotations | with_entries(select(.key | contains("cloud.google.com")))), type: .spec.type, status: .status}'
annotations:
cloud.google.com/neg: '{"ingress": true}'
cloud.google.com/neg-status: '{"network_endpoint_groups":{"80":"k8s1-ea949c44-gcsweb-gcsweb-80-15e79f37"},"zones":["us-central1-a","us-central1-c","us-central1-f"]}'
type: ClusterIP
status:
loadBalancer: {} |
Why make this change: because we have VPC-native and I thought that was required to enable GCP certificates. It turns out that it is NOT required. Why I did it the scary way: because it seemed obvious and gcsweb seemed like a low-risk target. Since then I learned that there's a safer way, which I will pay attention to :)
Step 1: Add annotation and wait for the NEG to be created.
It's pending docs review internally :( As I look at the next one, I will write down the steps I take. |
The followup to this will be to switch to GCP's certs, to prove we can and
to race with the expiry of the cert on our main sites :)
…On Mon, May 24, 2021 at 11:27 AM Tim Hockin ***@***.***> wrote:
why?
Why make this change: because we have VPC-native and I thought that was
required to enable GCP certificates. It turns out that it is NOT required.
Why I did it the scary way: because it seemed obvious and gcsweb seemed
like a low-risk target. Since then I learned that there's a safer way,
which I will pay attention to :)
was the scary way applying these changes all once? or were there some
steps involved?
Step 1: Add annotation and wait for the NEG to be created.
Step 2: Verify the LB was pointing to the NEG
Step 3: Change type to "ClusterIP"
is there a link to the safer way?
It's pending docs review internally :( As I look at the next one, I will
write down the steps I take.
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub
<#2080 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/ABKWAVBA6MD2YP74MEOPN63TPKLCHANCNFSM45KA5VOA>
.
|
I did this the scary way. Apparently there's a safer way when we do others. Anyway, this much is done already :)