-
Notifications
You must be signed in to change notification settings - Fork 713
RFC: Alert CR support for wildcard namespace #5432
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
RFC: Alert CR support for wildcard namespace #5432
Conversation
Signed-off-by: Dmitry Chepurovskiy <[email protected]>
7404d6e to
6772ca5
Compare
|
@matheuscscp You proposed to bring this feature discussions as a RFC. |
|
This RFC will hardly get through. I don't see anybody in the maintainers team interested in evaluating or considering the possibility of introducing a mechanism that breaks Kubernetes namespace isolation in such a... simplistic, or niche way. The Flux project has been historically trying to move away from this (a.k.a. If there's a big desire from the Flux community to have proper support for cross-namespace references, I'd lean more towards the
A specific point brought up in this similar RFC that I would be willing to consider is: It seems reasonable to me that cluster administrators may not want to share notification provider secrets with tenants. For this I would be willing to consider a controller-level flag that allows specifying a fallback secret in the same namespace of the controller pod (like we're gonna do here). Would this be useful? |
|
FWIW, I don't represent the whole flux community but as someone who administers several clusters of geo-distributed teams (that are not multi-tenant, but multi-ns), I'm not usually aware of what new Could I write a webhook that deploys a new |
/relates fluxcd/notification-controller#504
/relates fluxcd/notification-controller#71
/relates #4095
RFC covering support of monitoring all namespaces by Flux Alert.