-
-
Notifications
You must be signed in to change notification settings - Fork 303
feat: Add support for volumes and volumeMounts #1557
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
715eaa1 to
5b40387
Compare
Codecov Report❌ Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #1557 +/- ##
=======================================
Coverage ? 32.44%
=======================================
Files ? 79
Lines ? 5866
Branches ? 0
=======================================
Hits ? 1903
Misses ? 3770
Partials ? 193 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
5b40387 to
a8d96ae
Compare
|
@shubham-cmyk @drivebyer @iamabhishek-dubey can I ask one of you to approve the workflow? I fixed all the things that failed recently. Update: I fixed the examples and run the E2E tests locally. It should be good finally 👌 |
a2b0b24 to
b02983a
Compare
|
I think this pr should split into seprate pr. one for feature, another one for bugfix :) |
b02983a to
fe2ffdd
Compare
|
@drivebyer right, I just spitted the PR. |
|
@shubham-cmyk @drivebyer @iamabhishek-dubey sorry for direct ping, but can you please approve the workflow again? |
|
Semantic check fail, after so many pushes already.. What a shame 😅 Just fixed, sorry guys for that. |
fe2ffdd to
5a40710
Compare
|
@shubham-cmyk @drivebyer @iamabhishek-dubey Hi guys, the PR passed all the CI steps, can we merge it? :) |
8b051e5 to
8dd9da6
Compare
|
Seems like E2E tests are failing due to previously merged PR. I allowed myself to fix these in a separate PR: #1569 |
|
If you’d like to add ACL configuration to your Redis cluster, you can refer to the examples here: v1beta2/acl_config |
You are right, but I have a hard requirement to persist my ACL between Redis installation and k8s secret is not the best to store such data. |
The ACL data is stored in a dedicated Secret resource, making it independent from the Redis cluster lifecycle. |
|
In my setup, I need to support the multitenancy solution with the single Redis Cluster. That means, there is a lot of ACL modifications and relying the k8s secret for that is not the best practice. I am not saying storing ACL in a secret is bad idea - it is good, but not for all situations. Basically this additional volumes can be used also for other configuration items in the future. ACL is just an example that I am relying on my project. |
|
Got it. That might make the setup a bit more complicated for users. Since we already support spec.acl, what do you think about adding the ACL volume configuration there? |
|
I could but I wonder if that is not a step back from the current implementation.
Etc etc So maybe instead of limiting the additionalVolumes to spec.acl only, maybe I can add a separate example that will run Redis with ACL hosted on the additional volume? |
This PR definitely adds flexibility — but it also increases complexity for users, since they need to understand how to configure volume mounts. That’s why I’d suggest keeping it simple and focusing on solving your specific requirement directly. Then the operator could automatically handle the volume mount for the Redis cluster, which would make it more user-friendly overall. |
Ok, got it. I will work in the refactor probably today or tomorrow. Thanks for the guidlines and the discussion. |
8d9b334 to
9069d50
Compare
|
@drivebyer I implemented the changes to ACL as discussed, but I did it on top of the extra volumes.
I added some E2E tests to cover the ACL from PVC too, but there is this flaky tests with RedisCluster setup failing. |
4f3bbde to
00940cb
Compare
Add support for volumes and volumeMounts. Cover the changes with the tests. Update helm charts with the Volumes and VolumeMounts options. Add missing helm chart support for persistentVolumeClaimRetentionPolicy. Signed-off-by: Damian Seredyn <[email protected]>
00940cb to
07799bf
Compare
Description
New feature added: support for volumes and volumeMounts for the all of the Redis deployment types.
Type of change
Checklist
Additional Context
I need the volume and volumeMounts support to mount the external ACL file.
I tested the solution on my own cluster (AKS) and it works as expected:

