-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Ability to configure annotation defaults #746
Comments
Yeah, PRs are super welcome 😄 from my own point of view, both flag and configMap works.(though i prefers flags since i don't see the need to change these default settings at runtime, also the implementation is simpler if using style like |
@bbrewer-pillar Did you end up making any progress on this? |
@rodlogic I've been dragging my feet as my team is using a workaround via terraform state sharing for this (it's not great, but it works for now). |
@bbrewer-pillar No worries. I am coming to the conclusion that it doesn't make sense to have many of these annotations at the Service/Ingress level. In fact it just added complexity (e.g. manifest templatization, dependencies on additional infrastructure configuration items, etc) and potential instability. It looks good for a demo or potentially for very large organizations, which may need DNS names, certificates, ALBs created dynamically. Ideally, I want a solid infrastructure with all these components already provisioned (and pre-wired and just rely on the controller attaching/detaching targetGroups instead. |
@rodlogic I tend to agree. Another path we had thought might work was the single ALB approach, which I think this project has been working on. That might solve at least a few issues related to "set-once" configuration |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
@bbrewer-papa-x , @rodlogic : Is there any of you still working on this? Because I have a case where I want to enable access log for all ALB, and I want the Controller does it for me, not setting Ingress one by one. |
Rotten issues close after 30d of inactivity. Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
@fejta-bot: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
How open would this project be to a PR adding support for configurable annotation defaults/fallbacks?
For instance, I'm on a project where we create several ingresses across many repositories that all share the same Ingress annotations values for a variety of things: cert-arn, security-groups, subnets, etc.
I think this could be accomplished by any of the following:
Anyways, I would be willing to work on/contribute something like this, just want to get a feel for how welcome it would be and which option people might like more.
The text was updated successfully, but these errors were encountered: