Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

K8SPSMDB-1062: Setting appProtocol for service objects #1393

Open
wants to merge 2 commits into
base: main
Choose a base branch
from

Conversation

sorenmat
Copy link

@sorenmat sorenmat commented Dec 14, 2023

K8SPSMDB-1062 Powered by Pull Request Badge

CHANGE DESCRIPTION

Problem:
When running in Istio (perhaps other serice meshes) we need to set the appProtocol to mongo.
This is needed since mongo is a server first protocol, which breaks the mTLS protocol

Cause:

A mongo cluster is not able to form.

Solution:

Just adding mongo as an appProtocol see: https://kubernetes.io/docs/concepts/services-networking/service/#application-protocol

CHECKLIST

Jira

  • Is the Jira ticket created and referenced properly?
  • Does the Jira ticket have the proper statuses for documentation (Needs Doc) and QA (Needs QA)?
  • Does the Jira ticket link to the proper milestone (Fix Version field)?

Tests

  • Is an E2E test/test case added for the new feature/change?
  • Are unit tests added where appropriate?
  • Are OpenShift compare files changed for E2E tests (compare/*-oc.yml)?

Config/Logging/Testability

  • Are all needed new/changed options added to default YAML files?
  • Are the manifests (crd/bundle) regenerated if needed?
  • Did we add proper logging messages for operator actions?
  • Did we ensure compatibility with the previous version or cluster upgrade process?
  • Does the change support oldest and newest supported MongoDB version?
  • Does the change support oldest and newest supported Kubernetes version?

@CLAassistant
Copy link

CLAassistant commented Dec 14, 2023

CLA assistant check
Thank you for your submission! We really appreciate it. Like many open source projects, we ask that you sign our Contributor License Agreement before we can accept your contribution.
You have signed the CLA already but the status is still pending? Let us recheck it.

@egegunes egegunes self-assigned this Dec 14, 2023
@hors hors added the community label Dec 14, 2023
@egegunes egegunes added this to the v1.16.0 milestone Jan 12, 2024
Copy link
Collaborator

@hors hors left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@sorenmat please check and fix tests

@pull-request-size pull-request-size bot added size/S 10-29 lines and removed size/XS 0-9 lines labels Jan 16, 2024
pkg/psmdb/service.go Outdated Show resolved Hide resolved
@egegunes
Copy link
Contributor

egegunes commented Feb 2, 2024

@sorenmat ping

@sorenmat
Copy link
Author

sorenmat commented Feb 2, 2024

I'm on it... 👍🏼 sorry for the delay

@sorenmat sorenmat force-pushed the appProtocol branch 2 times, most recently from 3491eb0 to df4b668 Compare February 5, 2024 13:02
@pull-request-size pull-request-size bot added size/M 30-99 lines and removed size/S 10-29 lines labels Feb 5, 2024
@egegunes
Copy link
Contributor

egegunes commented Feb 9, 2024

@sorenmat please ensure that you add this new field to every service controlled by the operator

@sorenmat sorenmat force-pushed the appProtocol branch 2 times, most recently from c9c7eb9 to 61dc1f1 Compare February 22, 2024 07:53
@pull-request-size pull-request-size bot added size/S 10-29 lines and removed size/M 30-99 lines labels Feb 22, 2024
@egegunes
Copy link
Contributor

egegunes commented Mar 1, 2024

Hi @sorenmat! We're working on next PSMDB operator release and if you finish this PR in next 2 weeks we can include this.

@egegunes
Copy link
Contributor

egegunes commented Mar 8, 2024

@sorenmat there's a ExternalService function, please add the app protocol there also

@egegunes
Copy link
Contributor

@sorenmat ping

@sorenmat
Copy link
Author

@egegunes I'm a little tied up right now, because of Kubecon, so it might take a bit longer :|

@egegunes
Copy link
Contributor

@sorenmat if you can finish this next week, we can include it in v1.16.0

@sorenmat sorenmat force-pushed the appProtocol branch 2 times, most recently from ed493dc to 91f5890 Compare March 26, 2024 11:49
Copy link
Contributor

@egegunes egegunes left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

please fix conflicts

pkg/psmdb/service.go Outdated Show resolved Hide resolved
@egegunes egegunes changed the title Setting appProtocol for service objects K8SPSMDB-1062: Setting appProtocol for service objects Mar 28, 2024
@egegunes
Copy link
Contributor

egegunes commented Apr 4, 2024

@sorenmat ping

@hors
Copy link
Collaborator

hors commented Apr 9, 2024

@sorenmat @egegunes if we want to include it in v1.16.0 psmdb operator release please finish this PR this week. Thanks.

@hors hors requested review from hors and egegunes April 23, 2024 08:01
@hors hors requested a review from egegunes April 24, 2024 10:56
@hors hors removed this from the v1.16.0 milestone Apr 25, 2024
@sorenmat
Copy link
Author

sorenmat commented May 2, 2024

are the tests flaky, not sure how my change would result in tls-issue-cert-manager failing?

@JNKPercona
Copy link
Collaborator

Test name Status
arbiter passed
balancer passed
custom-replset-name passed
cross-site-sharded passed
data-at-rest-encryption passed
data-sharded passed
demand-backup passed
demand-backup-eks-credentials passed
demand-backup-physical passed
demand-backup-physical-sharded passed
demand-backup-sharded failure
expose-sharded passed
ignore-labels-annotations passed
init-deploy passed
finalizer passed
ldap passed
ldap-tls passed
limits passed
liveness passed
mongod-major-upgrade passed
mongod-major-upgrade-sharded passed
monitoring-2-0 passed
multi-cluster-service passed
non-voting passed
one-pod passed
operator-self-healing-chaos passed
pitr passed
pitr-sharded passed
pitr-physical passed
pvc-resize passed
recover-no-primary passed
rs-shard-migration passed
scaling passed
scheduled-backup passed
security-context passed
self-healing-chaos passed
service-per-pod passed
serviceless-external-nodes passed
smart-update passed
split-horizon passed
storage passed
tls-issue-cert-manager passed
upgrade passed
upgrade-consistency failure
upgrade-consistency-sharded-tls failure
upgrade-sharded passed
users passed
version-service passed
We run 48 out of 48

commit: 7b414d1
image: perconalab/percona-server-mongodb-operator:PR-1393-7b414d13

@egegunes
Copy link
Contributor

@sorenmat do you still want to merge this? if you want, you can fix conflicts and change crVersion checks to 1.19.0.

@egegunes
Copy link
Contributor

@hors maybe we can take this over and include it in v1.19.0?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants