-
Notifications
You must be signed in to change notification settings - Fork 56
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support for shared external AKS cluster #682
Conversation
@jsaun Please add an issue for this. |
|
||
if (!string.IsNullOrWhiteSpace(configuration.AksClusterName) && !configuration.UsePostgreSqlSingleServer) | ||
{ | ||
throw new Exception("If providing an existing AKS cluster, --UsePostgreSqlSingleServer must be set to true."); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Isn't single server being retired in 19 months?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We'll see, you still can't create private endpoint to a flexible postgres server. So if postgres is in our vnet and our services are running in AKS in another vnet, there's no good way to connect. We'd have to set postgres to public, or peer the vnets both of which are aren't ideal.
Networking fixes:
If a preexisting AKS cluster is supplied, query for the vnet it belongs to, create the postgresql PE to that vnet, and use the associated private dns zone if it exists.
Namespace Fixes:
Storage classes and persistent volume claims are not namespaced objects in Kubernetes. This prepends a namespace to the required objects to avoid conflicts in the case that multiple CoA instances are deployed into different namespaces on the same AKS cluster (customer ran into this need). Fixes #683