-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
insecureKubeletReadonlyPortEnabled support #2013
Comments
seems this depends on open PR GoogleCloudPlatform/magic-modules#11272 so its not an issue on the module |
Side note: with latest provider and module, I was getting a permadiff closer to this (when that setting was changed); presumably because another field under ~ node_config {
[...]
~ kubelet_config {
+ cpu_manager_policy = "static"
# (2 unchanged attributes hidden)
}
# (2 unchanged blocks hidden)
} For me, setting that to the undocumented value of Also filed a separate issue for that here |
@DrFaust92 Should be supported in upcoming 6.x releases and is also supposed to get cherry-picked into 5.x (also, sorry for causing some conflicts for your GCFS PR) |
It will be worth keeping an eye out for issues (in the module) related to hashicorp/terraform-provider-google#15767 once this is supported. |
FWIW, this is now out in https://github.com/hashicorp/terraform-provider-google/releases/tag/v5.44.0 I'm throwing up a pass at adding the support in #2082 That said, there may be some quirks when people start adding the setting, especially before |
similar to OP, trying to disable the insecure kubelet readonly port. looking at feat(TPG>=5.44)!: add support for insecureKubeletReadonlyPortEnabled, I see this was updated in numerous modules, We use beta-autopilot-private-cluster, but i dont see that updated? Perhaps I'm missing it, or it's downstream of Is there guidance on how to proceed with modules that were not updated? Note: I have not executed the |
@UDtorrey with my limited testing so far, if you've set the value out of band, since it's optional / computed at the provider level, you shouldn't need to change any settings or see drift (other than getting a "state changed" notification), even if you have a provider version that supports the attribute. That said, it's unclear whether the fixes for some of the bugs / issues causing problems with 5.xx will be cherry-picked into 5.x or be 6.x only... but since you've made the changes directly, once some of the other issues with related / similar fields are resolved, you may be able to have the state apply cleanly even without direct support for this parameter in the module. Right now, I'm using the latest of this module (with a non autopilot cluster) and 6.2 TPG, and I see just the gcfs_config perrmadrift that will soon be fixed. I ran into some other issues with the draft PR I currently have w/r/t autopilot specifically. If you look at the comments there, though, I think the intent is to try and support it (using the same parameter name), either in that PR or in a followup, but there are some complexities with bugs that affect different provider versions for the autopilot and non-autopilot variants. Note: I don't work for Google, and this is not an "official" answer to your questions about what the module will / won't support, but hope it helps. |
The upstream provider (intentionally) uses an enum of `"TRUE"` / `"FALSE"` vs. a boolean. Update the code to follow this, and add a test case that covers the cluster level setting vs node pool one. Fixes terraform-google-modules#2013
The upstream provider (intentionally) uses an enum of `"TRUE"` / `"FALSE"` vs. a boolean. Update the code to follow this, and add a test case that covers the cluster level setting vs node pool one. Fixes terraform-google-modules#2013 Co-authored-by: Andrew Peabody <[email protected]>
Add `insecureKubeletReadonlyPortEnabled` to `node_config.kubelet_config` for the default node-pool and for additional pools. It may also be necessary to define the top level `node_config` more broadly for the case where `remove_default_node_pool` is set to false, which should probably be handled separately. Also, the upstream provider (intentionally) uses an enum of `"TRUE"` / `"FALSE"` vs. a boolean. Update the code to follow this, and add a test case that covers the cluster level setting vs node pool one. Fixes terraform-google-modules#2013 Co-authored-by: Andrew Peabody <[email protected]>
Add `insecureKubeletReadonlyPortEnabled` to `node_config.kubelet_config` for the default node-pool and for additional pools. It may also be necessary to define the top level `node_config` more broadly for the case where `remove_default_node_pool` is set to false, which should probably be handled separately. Also, the upstream provider (intentionally) uses an enum of `"TRUE"` / `"FALSE"` vs. a boolean. Update the code to follow this, and add a test case that covers the cluster level setting vs node pool one. Fixes terraform-google-modules#2013 Co-authored-by: Andrew Peabody <[email protected]>
TL;DR
Is the
insecureKubeletReadonlyPortEnabled
flag in the kubelet config supported? With the recent announcementshttps://cloud.google.com/kubernetes-engine/docs/how-to/disable-kubelet-readonly-port#migrate-apps, I updated the cluster configs.
Probably depends on hashicorp/terraform-provider-google#15208
After running:
I seem to be getting some unresolvable diffs with the kubelet config. I might be just running into something related to #1922 but I believe I did check the configs after updating to the latest module version, and I didn't have any luck just by setting
pod_pids_limit
andcpu_cfs_quota
in the pod config.diffs:
I can see this in the debug logs
Terraform Resources
No response
Detailed design
No response
Additional information
No response
The text was updated successfully, but these errors were encountered: