Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Azure managed image #1114

Open
steve-jansen opened this issue Sep 8, 2020 · 2 comments
Open

Azure managed image #1114

steve-jansen opened this issue Sep 8, 2020 · 2 comments
Labels
area/core Issues core to the OS (variant independent) status/icebox Things we think would be nice but are not prioritized type/enhancement New feature or request

Comments

@steve-jansen
Copy link

What I'd like:
As a multi-cloud enterprise, I want to use the same container-friendly Linux distro in both AWS and Azure.

Context
My company was an early adopter of CoreOS Container Linux, which was beloved by our teams for both AWS and Azure. There are many exciting things about Bottlerocket OS, similar to what we ❤️ about CoreOS: minimal, container focused, atomic updates, systemd, and new things like Rust for 1st party components and zero trust privileged access.

Formal builds for both AWS and Azure would role model the Charter principle of being Open 😄

Any alternatives you've considered:
Flatcar Linux (which is also great!)

@samuelkarp
Copy link
Contributor

Thanks for opening this issue! I'll echo what @jhaynes wrote on #968:

We’d love to get Bottlerocket working on Azure and are looking forward to expanding Bottlerocket's build targets. However, Azure support isn't next on our priority list. That said, we'd welcome contributions here if you have experience with Azure! We’re happy to provide guidance on what build system changes might be required.

The first few things that are currently AWS-centric are any place we call IMDS; namely pluto and early_boot_config. In the case of early_boot_config, a user could extend the program for Azure using the PlatformDataProvider trait provided in main.rs. In the case of pluto, a user could duplicate or extend it to read whatever data sources Azure makes available for Kubernetes configuration variables.

Aside from that, this would involve building a new variant. A recent example that shows some of the things that would need to be updated is here.

Other things that would need to be extended, validated or built (and this isn't a complete list):

  • netdog - maybe depending on DHCP in AWS/Azure
  • host-ctr assumes ECR (and auth)
  • Need a replacement for aws-iam-authenticator to pull containers from Azure container registry

@samuelkarp samuelkarp added the type/enhancement New feature or request label Sep 24, 2020
@gregdek gregdek added this to the backlog milestone Apr 1, 2021
@stmcginnis stmcginnis added status/needs-triage Pending triage or re-evaluation and removed priority/p2 labels Dec 1, 2022
@stmcginnis stmcginnis removed this from the backlog milestone Feb 16, 2023
@stmcginnis stmcginnis added area/core Issues core to the OS (variant independent) status/icebox Things we think would be nice but are not prioritized and removed status/needs-triage Pending triage or re-evaluation labels Feb 16, 2023
@mjudeikis
Copy link

mjudeikis commented Jun 29, 2023

Would be great to have this!

I think contributing from outside could be done, but fact Azure nodes images are private and build based on semi-proprietary image building project Azure/AgentBaker#3340 does not make it easier to work on this in opensource capacity. Testing is very hard if you don't carry Microsoft badge.

We could make it working on Azure/AKS but it still need to be integrated into Agentbaker some way as looks like only way to get image properly adopted by AKS is agentbaker.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/core Issues core to the OS (variant independent) status/icebox Things we think would be nice but are not prioritized type/enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

6 participants