Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Cross namespace storage accounts with per namespace blob container #3049

Closed
b1zzu opened this issue Jun 6, 2023 · 3 comments
Closed

Cross namespace storage accounts with per namespace blob container #3049

b1zzu opened this issue Jun 6, 2023 · 3 comments

Comments

@b1zzu
Copy link

b1zzu commented Jun 6, 2023

Describe the current behavior

Currently, if I want to use a storage account in multiple namespaces with a container per namespace I have to recreate the whole ResourceGroup -> SotorageAccount -> StorageAccountsBlobService -> StorageAccountsBlobServicesContainer. While I can annotate the ResourceGroup, StorageAccountsBlobService, StorageAccountsBlobServicesContainer with the serviceoperator.azure.com/reconcile-policy: skip annotations so that I don't have multiple namespaces trying to manage the same resource I still have to set the SotorageAccount as managed otherwise the secret with the keys is not created in the namespace I need them.

Describe the improvement

I see two improvements:

  • Minor: allow referencing resources across namespaces
  • Define an additional reconcile-policy to only sync secrets or make the skip policy sync secrets in the cluster
@theunrepentantgeek
Copy link
Member

Kubernetes object ownership cannot cross namespace boundaries:

Cross-namespace owner references are disallowed by design. Namespaced dependents can specify cluster-scoped or namespaced owners. A namespaced owner must exist in the same namespace as the dependent.

That said, I think we have a couple of things on our backlog that would solve much, if not all, of your problem.

The first is feature request #2357, which would allow owners to be arbitrary ARM references.

The second is bug report #2985, where a user wants config-maps to be published from a resource even if marked with skip. We think treating secrets the same way would be appropriate.

Do you think that combination would work in your context?

@b1zzu
Copy link
Author

b1zzu commented Jun 7, 2023

@theunrepentantgeek Yes it should work, I think we can then close this task in favor of the issues you have mentioned.

@matthchr
Copy link
Member

Closing this as requested.

@github-project-automation github-project-automation bot moved this from Backlog to Recently Completed in Azure Service Operator Roadmap Jun 12, 2023
@matthchr matthchr moved this from Recently Completed to Ready for Release in Azure Service Operator Roadmap Jun 12, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
Development

No branches or pull requests

3 participants