-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support node_kublet_config
in node_pool_auto_config
so users can disable the kubelet read-only port
#19236
Support node_kublet_config
in node_pool_auto_config
so users can disable the kubelet read-only port
#19236
Comments
node_kublet_config
in node_pool_auto_config
kublet_config
in node_pool_auto_config
kublet_config
in node_pool_auto_config
node_kublet_config
in node_pool_auto_config
Add support for `node_kubelet_config in `node_pool_auto_config`. See: hashicorp/terraform-provider-google#15208 (comment) Per: https://pkg.go.dev/google.golang.org/api/container/v1#NodePoolAutoConfig Currently only `insecure_kubelet_readonly_port_enabled` can be set here. Fixes hashicorp/terraform-provider-google#19236 Fixes hashicorp/terraform-provider-google#19153
Add support for `node_kubelet_config in `node_pool_auto_config`. See: hashicorp/terraform-provider-google#15208 (comment) Per: https://pkg.go.dev/google.golang.org/api/container/v1#NodePoolAutoConfig Currently only `insecure_kubelet_readonly_port_enabled` can be set here. Fixes hashicorp/terraform-provider-google#19236 Fixes hashicorp/terraform-provider-google#19153
The good news is that I made pretty good progress on this. I'll put up a draft or a PR shortly. However, even though it uses
So I'm not sure if it makes sense to implement it using the same code / schema as other KubeletConfig stuff or not. Another problem with it being this way is that Also, naming-wise, I think it makes sense to match the upstream as originally planned: node_pool_auto_config {
node_kubelet_config {}
} though maybe an argument could be made for matching |
Add support for `node_kubelet_config` in `node_pool_auto_config`. See: hashicorp/terraform-provider-google#15208 (comment) Per: https://pkg.go.dev/google.golang.org/api/container/v1#NodePoolAutoConfig Currently only `insecure_kubelet_readonly_port_enabled` can be set here. Fixes hashicorp/terraform-provider-google#19236 Fixes hashicorp/terraform-provider-google#19153
Add support for `node_kubelet_config` in `node_pool_auto_config`. See: hashicorp/terraform-provider-google#15208 (comment) Per: https://pkg.go.dev/google.golang.org/api/container/v1#NodePoolAutoConfig Currently only `insecure_kubelet_readonly_port_enabled` can be set here. Fixes hashicorp/terraform-provider-google#19236 Fixes hashicorp/terraform-provider-google#19153
Add support for `node_kubelet_config` in `node_pool_auto_config`. See: hashicorp/terraform-provider-google#15208 (comment) Per: https://pkg.go.dev/google.golang.org/api/container/v1#NodePoolAutoConfig Currently only `insecure_kubelet_readonly_port_enabled` can be set here. Fixes hashicorp/terraform-provider-google#19236 Fixes hashicorp/terraform-provider-google#19153
node_kublet_config
in node_pool_auto_config
node_kublet_config
in node_pool_auto_config
so users can disable the kubelet read-only port
the naming should match the API - and FWIW even if the API supported other child fields I'd be inclined to only add the read-only port for now so that we can backport more easily. |
(This is probably the only remaining ticket in this cluster that we'd consider for backporting, barring further evidence of impact.) |
GoogleCloudPlatform/magic-modules#11572 possibly might be worth considering too, if we can get it narrow enough - otherwise, I'm guessing users of the GKE cluster module might see some issues if they don't set it to |
Although that is definitely a confusing bug, it probably doesn't rise to the level of backport, because it has a clear workaround and doesn't cause the cluster to get recreated. (Even if it did, that might not be sufficient for a backport on its own.) The read-only port fields are an exceptional case because they involve giving users a workaround for a known breaking change that will be made on the API side in the near future. |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Community Note
Description
[comes from a comment from @hoskeri in #15208]
It appears that
node_pool_auto_config
doesn't currently supportnode_kublet_config
.I'm not sure how necessary it is for autopilot clusters (hopefully Google provides sensible defaults there), but there was discussion about adding support for some or all of the parameters supported there for
node_pool_auto_config
as well, similar to some of the other blocks / resources it's supported for.New or Affected Resource(s)
Potential Terraform Configuration
References
#15208
GoogleCloudPlatform/magic-modules#11272
b/362277444
The text was updated successfully, but these errors were encountered: