Skip to content

Conversation

@RafalKorepta
Copy link
Contributor

@RafalKorepta RafalKorepta commented Jul 11, 2025

In default helm deployment the operator will managed its custom resources in
multiple namespaces. The Role rules are moved to ClusterRole resource to give
enough privileges to operator process.

K8S-586

@github-actions
Copy link

This PR is stale because it has been open 5 days with no activity. Remove stale label or comment or this will be closed in 5 days.

@github-actions github-actions bot added the stale label Jul 17, 2025
@RafalKorepta RafalKorepta force-pushed the chris/p/k8s-586-cluster-scope branch from fb02a9c to 0441b5d Compare July 21, 2025 16:40
@RafalKorepta RafalKorepta marked this pull request as ready for review July 21, 2025 16:40
@RafalKorepta RafalKorepta changed the title [DRAFT] operator: change to cluster scope operator: change to cluster scope Jul 21, 2025
@RafalKorepta RafalKorepta force-pushed the chris/p/k8s-586-cluster-scope branch from 0441b5d to 8f3131a Compare July 21, 2025 16:54
@he0s
Copy link

he0s commented Jul 22, 2025

Am I right that after this update the operator will allow deploying the operator itself and redpanda resources into different namespaces?

@RafalKorepta
Copy link
Contributor Author

@he0s Yes, that's the plan

@RafalKorepta RafalKorepta force-pushed the chris/p/k8s-586-cluster-scope branch from 8f3131a to 8ccedaa Compare July 22, 2025 14:04
@he0s
Copy link

he0s commented Jul 22, 2025

@RafalKorepta that's great! I tried to deploy a cluster with using the operator today and I wanted to have the feature in operator, since it's required to deploy operator and a new cluster into separate namespaces.

@RafalKorepta RafalKorepta force-pushed the chris/p/k8s-586-cluster-scope branch 3 times, most recently from 2934270 to d6516dd Compare July 25, 2025 07:59
@RafalKorepta RafalKorepta changed the title operator: change to cluster scope operator: Change operator management to cluster scope Jul 25, 2025
@RafalKorepta RafalKorepta force-pushed the chris/p/k8s-586-cluster-scope branch 2 times, most recently from 6e857c2 to 0230b93 Compare July 28, 2025 08:21
@RafalKorepta RafalKorepta force-pushed the chris/p/k8s-586-cluster-scope branch from 0230b93 to 837932a Compare July 29, 2025 15:42
Copy link
Contributor

@andrewstucki andrewstucki left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

From a basic pass LGTM. Even though the next initial release is light. I would want to verify that the upgrade works smoothly before shipping this though.

@RafalKorepta
Copy link
Contributor Author

@RafalKorepta RafalKorepta force-pushed the chris/p/k8s-586-cluster-scope branch from 837932a to 430d5ad Compare August 1, 2025 13:13
@github-actions
Copy link

github-actions bot commented Aug 7, 2025

This PR is stale because it has been open 5 days with no activity. Remove stale label or comment or this will be closed in 5 days.

@github-actions github-actions bot added the stale label Aug 7, 2025
@chrisseto chrisseto force-pushed the chris/p/k8s-586-cluster-scope branch from 430d5ad to 90a415d Compare August 8, 2025 15:11
In default helm deployment the operator will managed its custom resources in
multiple namespaces. The Role rules are moved to ClusterRole resource to give
enough privileges to operator process.
@chrisseto chrisseto force-pushed the chris/p/k8s-586-cluster-scope branch from 90a415d to 67577eb Compare August 8, 2025 15:29
@chrisseto
Copy link
Contributor

This PR is in good shape right now. The added upgrade tests will currently fail because they're trying to install CRDs for v25.1.x that don't exist.

I don't think it makes sense to keep harpoon working the way it does as it leaves us blind to bugs that might occur from CRD changes. I'm looking into adding vCluster isolation for the upgrade tests.

We'll also need to verify that the kustomize installation path used by cloud works as expected or just upgrade them to using the helm chart. (My preference would be for the latter).

@github-actions
Copy link

This PR is stale because it has been open 5 days with no activity. Remove stale label or comment or this will be closed in 5 days.

Copy link
Contributor

@chrisseto chrisseto left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Strong preference to use crds.enabled=true so we don't accidentally miss any regressions. We can punt if there's an additional complication I'm overlooking.

redpandav1alpha2 "github.com/redpanda-data/redpanda-operator/operator/api/redpanda/v1alpha2"
)

// this is a nasty hack due to the fact that we can't disable the linter for typecheck
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

😬 hadn't seen that issue before

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yeah, it's gross, it happens because the linter freaks out when we're only doing type assertions/casting with an imported package (the places where we're upcasting runtime.Object to client.Object via o := obj.(client.Object)). Output looks like this as a linter failure and is unable to be suppressed:

acceptance/steps/k8s.go:13:2: "sigs.k8s.io/controller-runtime/pkg/client" imported and not used (typecheck)
--
  | "sigs.k8s.io/controller-runtime/pkg/client"

this is the only way of getting around it since I can't mute it. We can probably upgrade golangci-lint to see if any newer versions don't have this issue, but it's pretty 🤮 as is.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

upgrading golangci-lint is generally pretty painful punt that to another day / week / month 😛

@andrewstucki andrewstucki merged commit d802492 into main Aug 15, 2025
11 checks passed
@andrewstucki andrewstucki deleted the chris/p/k8s-586-cluster-scope branch August 15, 2025 21:52
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants