-
Notifications
You must be signed in to change notification settings - Fork 539
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Re-think how we manage prerequisites in clusterawsadm (LFX Spring 2023 Mentorship) #3715
Comments
I'm running into this same issue. Another user previously created CAPA IAM roles via clusterawsadm, however they didn't enable EKS so the appropriate roles don't exist. Subsequent bootstrap attempts with EKS enable fail because the cloudformation stack doesn't skip roles that already exists, instead it fails and rolls everything back. |
/triage accepted |
@richardcase: GuidelinesPlease ensure that the issue body includes answers to the following questions:
For more details on the requirements of such an issue, please see here and ensure that they are met. If this request no longer meets these requirements, the label can be removed In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
We want to use this for the LFX Spring 23 program, so until that starts /assign |
@richardcase it's an interesting feature, I would like to contribute to this feature in the lfx spring mentorship. |
The project is now listed: https://mentorship.lfx.linuxfoundation.org/project/2d76dbe6-43eb-465e-a852-64b2e48f2c68 |
hi, @richardcase I am CS graduate student from USC. I am very interested in this project and have project experience with go, docker and kubernetes. I just applied to the LFX mentorship program. Could you give some suggestions on getting started on this project? Thank you. |
@guohaoyu110 - thanks for your interest. Until the application window shuts and selection have been made it's best not to work on this issue. However, understanding go & kubernetes will really help if you are selected. |
/retitle Re-think how we manage prerequisites in clusterawsadm (LFX Spring 2023 Mentorship) |
The LFX application period is open until 14th Feb 2023. Applications are reviewed 15th-28th Feb. |
The dates have slightly changed and applications are now open until 21st Feb. The full timeline can be seen here: https://github.com/cncf/mentoring/tree/main/lfx-mentorship/2023/01-Mar-May#term-01---2023-march---may |
This issue is labeled with You can:
For more details on the triage process, see https://www.kubernetes.dev/docs/guide/issue-triage/ /remove-triage accepted |
/kind feature
/area clusterawsadm
Describe the solution you'd like
Currently, we use
clusterawsadm
to create the AWS prerequisites (i.e. IAM stuff). This creates a Cloud Formation stack.Users are running into issues with the clusterawsadm/cloud formation approach because CloudFormation is region specific but IAM is global. Customers end up in the position where the stacks are created in multiple regions but some fail as the IAM resources have been created by another stack in another reason. Other users have run into other issues with the cloud formation stack for various reasons.
Anything else you would like to add:
I personally think we should remove the use of Cloud Formation and look at another solution.
Environment:
kubectl version
):/etc/os-release
):The text was updated successfully, but these errors were encountered: