-
Notifications
You must be signed in to change notification settings - Fork 146
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
K8SPSMDB-1062: Setting appProtocol for service objects #1393
base: main
Are you sure you want to change the base?
Conversation
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@sorenmat please check and fix tests
@sorenmat ping |
I'm on it... 👍🏼 sorry for the delay |
3491eb0
to
df4b668
Compare
@sorenmat please ensure that you add this new field to every service controlled by the operator |
c9c7eb9
to
61dc1f1
Compare
61dc1f1
to
6415417
Compare
Hi @sorenmat! We're working on next PSMDB operator release and if you finish this PR in next 2 weeks we can include this. |
@sorenmat there's a |
@sorenmat ping |
@egegunes I'm a little tied up right now, because of Kubecon, so it might take a bit longer :| |
@sorenmat if you can finish this next week, we can include it in v1.16.0 |
ed493dc
to
91f5890
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
please fix conflicts
@sorenmat ping |
e2e-tests/upgrade-consistency-sharded-tls/compare/service_some-name-cfg-1140.yml
Outdated
Show resolved
Hide resolved
e2e-tests/upgrade-consistency-sharded-tls/compare/service_some-name-rs0-1150.yml
Outdated
Show resolved
Hide resolved
are the tests flaky, not sure how my change would result in tls-issue-cert-manager failing? |
commit: 7b414d1 |
@sorenmat do you still want to merge this? if you want, you can fix conflicts and change |
@hors maybe we can take this over and include it in v1.19.0? |
CHANGE DESCRIPTION
Problem:
When running in Istio (perhaps other serice meshes) we need to set the appProtocol to mongo.
This is needed since mongo is a server first protocol, which breaks the mTLS protocol
Cause:
A mongo cluster is not able to form.
Solution:
Just adding mongo as an appProtocol see: https://kubernetes.io/docs/concepts/services-networking/service/#application-protocol
CHECKLIST
Jira
Needs Doc
) and QA (Needs QA
)?Tests
compare/*-oc.yml
)?Config/Logging/Testability