-
Notifications
You must be signed in to change notification settings - Fork 1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
GCP infra stack: single-region secure connectivity for GKE & CloudSQL, CloudMemorystore, Buckets #615
Comments
I think we can create the sub-issues as individual tasks in the following form:
|
It might be worth including the creation of strongly typed resource classes for each managed kind in this process, as it will also require a minor update to each claim controller. |
@hasheddan just added, thanks! I'll move the bulletpoints up into the first issue description once we finalize and I create the issues. |
This was referenced Aug 5, 2019
4 tasks
4 tasks
This was referenced Sep 3, 2019
This was referenced Sep 11, 2019
Closed
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
GCP infra stack users can configure everything for their environment from the Kubernetes API including networking, subnets, and secure connectivity between app deployments in a target cluster and the dynamically provisioned cloud services they depend on.
Part of the 0.3 release
Why? What problem are we solving?
A Stack is a set of CRDs and controllers that extend Crossplane. An infrastructure stack adds support for infrastructure (e.g. databases, VMs, etc), as opposed to adding support for an application (e.g. Wordpress, GitLab).
We'd like to take our first steps in this direction by breaking Crossplane's current Google Cloud Platform (GCP) managed resource functionality out into a GCP stack (covered by #612). Once the stack is broken out, we want to ensure it:
What does it look like when we're done?
v1alpha2
variants of all existingv1alpha1
GCP managed resources.v1alpha2
variants of all existingv1alpha1
GCP managed resource classes. This is predicated on the work tracked in Resource classes can be validated and annotated #613.GKECluster
andCloudSQLInstance
managed resources as described in Add a draft one pager for MVP resource connectivity #606. This impliesNetwork
andSubnetwork
managed resources under thevpc.gcp.crossplane.io/v1alpha1
API group.KubernetesApplication
can be scheduled and deployed to a GCP backedKubernetesCluster
, and leverage GCP backed resource claims.How could this be demonstrated?
For example:
Network
andSubnetwork
managed resources.CloudSQLInstanceClass
that will use the aforementionedNetwork
as the whitelisted private network.GKEClusterClass
that will create nodes in the aforementionedNetwork
andSubnetwork
.MySQLInstance
andKubernetesCluster
resource claims referencing the aforementioned resource classes.KubernetesCluster
. Ensure it can access the aforementionedMySQLInstance
.Related
The text was updated successfully, but these errors were encountered: