Replies: 3 comments 7 replies
-
It's something we always had in mind, and waiting for community's rising interest! We considered providing a dedicated
Such an approach would require a new field in the In this latter case, should we support cross-namespace Cluster references? Or should it be a local reference as we're all ready expecting with Secret or ConfigMap references? Happy an excited to discuss more! |
Beta Was this translation helpful? Give feedback.
-
Definitely a useful feature. |
Beta Was this translation helpful? Give feedback.
-
#108 has been merged, marking this feature in It would be great to have some tests on this trying to spot bugs, the discussion can be closed since bugs must be filled in the Issue section. |
Beta Was this translation helpful? Give feedback.
-
Most (if not all) Cluster API providers can be deployed in a Kubernetes cluster that's separated from the environment where they provision resources, e.g. the AWS provider could be in a different VPC than the instances it deploys.
This is currently not possible with Kamaji, because it deploys control planes in the same cluster that it watches custom resources in.
I have the following setup in mind:
cluster A: CAPI controlllers
cluster B: control planes
cluster C: same as B but different location
This would require breaking the ownership chain at one point, e.g. between KCP and TCP, so resources would need to be cleaned up by the controller directly. The benefit is that is allows each cluster to implement different resource and access management policies.
Beta Was this translation helpful? Give feedback.
All reactions