-
Notifications
You must be signed in to change notification settings - Fork 192
CAPD clusters utilize an alpine-based image for HA Proxy #210
Comments
opened an issue in CAPD, requesting this to be configurable: kubernetes-sigs/cluster-api#4950 |
i was going to open an issue in kind, but how I'm reading this slack thread it seems kind would prefer cluster-api build these images. |
Hey all 👋 -- was #244 verified to fix the usage of Alpine? I'm finding Alpine to still be used. Below are my steps, let me know if I am validating this incorrectly.
|
@joshrosso i bet you need |
@joshrosso scratch what i said about
@randomvariable has a bump to v0.3.21 ( #223 ) BUT the non-alpine haproxy came after that kubernetes-sigs/cluster-api@v0.3.21...HEAD So we will have to wait for v0.3.22 of CAPI |
Today, I validated a cluster creation based on tanzu-framework
ha proxy container
image inspection
|
Bug description
VMware has restrictions against using alpine-based images. If users create a
cluster using our docker-based (CAPD) provider an alpine-based image will be
used. A user of
tanzu
can spin up one of these clusters using the followingcommand.
Once the management cluster is bootstrapped, the user will see an HA proxy
instance that is based off kind. This is the proxy used to front the API server.
This image is referenced as a constant in CAPD:
https://github.com/kubernetes-sigs/cluster-api/blob/bfc6f80add5c21b8dc2b704951f42bc14708ebc4/test/infrastructure/docker/third_party/forked/loadbalancer/const.go#L19-L20
It is built inside of the kind repository.
https://github.com/kubernetes-sigs/kind/tree/main/images/haproxy
Affected product area (please put an X in all that apply)
Version (include the SHA if the version is not obvious)
The text was updated successfully, but these errors were encountered: