-
Notifications
You must be signed in to change notification settings - Fork 60
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add Afterburn #4
Comments
@cgwalters coreos-metadata is primarily for fetching metadata such as IP addresses from cloud providers. We need to do that on every boot because e.g. stopping and restarting an EC2 instance will cause new IP addresses to be assigned. Responding to changes in the network environment doesn't seem to me to conflict with the idea of immutable infrastructure. Are you referring to the sshkeys functionality specifically? It's worth noting that coreos-metadata is currently part of the Ignition ecosystem (via CT dynamic data), unless we decide to change that. |
Yeah.
Right, though (AIUI) that functionality was added as a dependency of etcd/locksmith right? Anyways...my vote is to ship it! But I just want to have some discussion for each bit of functionality. |
Even if it were just for the SSH keys, I'd vote to include it. Those rarely change from boot to boot, so we could argue that changing SSH keys isn't supported, but without coreos-metadata, it won't even work on the first boot IIUC, which is bound to surprise people. So not including it would at least require teaching it to Ignition. |
It definitely works to install SSH keys with Ignition, without having coreos-metadata. What doesn't work is using the |
Yep, I'm talking about the provider SSH keys too. (Though playing with it in OpenStack right now, it seems like that's actually handled by |
@jlebon In CL, @cgwalters Yeah, if we require that users provide an Ignition config, lots of people will trip over that.
It can be used to configure etcd, but it can also be used to configure arbitrary other services. |
|
I changed the title of this issue to reflect the outcome in openshift/os#125 (comment). |
related work items we need to complete as part of this:
|
It seems like we aren't too far off from having all source rpms needed to push this over the edge and not bundle.
|
Updated title for |
Fedora package review request for Afterburn: https://bugzilla.redhat.com/show_bug.cgi?id=1703542 |
Add Afterburn to the package manifest, and enable the provider checkin and afterburn ssh keys services. Closes coreos/fedora-coreos-tracker#4
Add Afterburn to the package manifest, and enable the provider checkin and afterburn ssh keys services. Closes coreos/fedora-coreos-tracker#4
Add Afterburn to the package manifest, and enable the provider checkin and afterburn ssh keys services. Closes coreos/fedora-coreos-tracker#4
Add Afterburn to the package manifest, and enable the provider checkin and afterburn ssh keys services. Closes coreos/fedora-coreos-tracker#4
Add Afterburn to the package manifest, and enable the provider checkin and afterburn ssh keys services. Closes coreos/fedora-coreos-tracker#4
Add Afterburn to the package manifest, and enable the provider checkin services through the coreos preset file. Part of coreos/fedora-coreos-tracker#4.
Opened coreos/fedora-coreos-config#93 to add this into FCOS, which also enables the For Enabling it on FCOS and
I notice in |
could we just use |
Ahh yes that'd make sense, just like the |
Add Afterburn to the package manifest, and enable the provider checkin services through the coreos preset file. Part of coreos/fedora-coreos-tracker#4.
Add ConditionKernelCommandLine triggering conditions so that the [email protected] unit is enabled only when recognized cloud platforms are specified through `ignition.platform.id`. For now, these platforms are `azure` and `packet` which are currently supported in the `afterburn-checkin` and `afterburn-firstboot-checkin` services. Part of: coreos/fedora-coreos-tracker#4
Add `ConditionKernelCommandLine` triggering conditions so that the `[email protected]` unit is enabled on supported platforms only. Note this only adds conditions for platforms where the cloud metadata provider is also identified through `ignition.platform.id`. Part of: coreos/fedora-coreos-tracker#4
With coreos/fedora-coreos-config#97 merged, this completes enabling Afterburn functionality in FCOS. Marking as done (please re-open if you think of something else missing). |
Thanks @rfairley |
We're going to focus on Ignition, but today CL includes coreos-metadata. Unlike Ignition, it runs every boot; it's obviously very useful, but IMO this blurs the story of "immutable infastructure".
(I personally vote to include it, but we should think about it)
The text was updated successfully, but these errors were encountered: