-
Notifications
You must be signed in to change notification settings - Fork 261
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ACK importing resources per tag feature #2297
Comments
Hi @alicvsroxas, I understand the use case and see how this could streamline managing AWS resource information dynamically. I'll raise this with the ACK and Kro teams to explore potential solutions and get back to you. In the meantime, feel free to create an issue on the Kro GitHub repository to track this idea and gather feedback from the community. |
Hi @alicvsroxas, closing this issue for now. Feel free to reopen it if not yet resolved. Thanks! |
@michaelhtm: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/reopen |
@michaelhtm: Reopened this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Hello, thank you for reopening the case. |
/reopen |
@alicvsroxas: Reopened this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Problem description
During our development and testing with ACK, we ran into a particular use case.
Originally, when running our infrastructure using Terraform, we relied on a small amount of data sources that retrieves information from AWS.
For example, getting VPC ID, subnets IDs, roles ARNs and so forth.
We are trying to find an alternative for this use case when it comes running our systems using ACK.
We would like to hear your thoughts on an ACK feature that gets information from AWS objects that were created previously,
and store them in either Kubernetes Configmaps, or Kubernetes Secrets, to be later used by other deployments that require that information.
Solutions
A new Custom Resource Definition that receives a certain "Selector Terms".
For example, get me all subnet IDs that have a tag that I specify in the Custom Resource,
and place them in a Kubernetes Configmap which I can later mount or make use of using, for example, Kro,
for any deployment that needs that information in order to function.
We believe it can remove the overhead of managing a hardcoded Configmap which we will need to update each time,
and instead rely on an automatic solution, with AWS cloud access, to fetch that information reliably.
The text was updated successfully, but these errors were encountered: