Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Windows Node Group Support, Upgrade Grafana Operator, Add SecretRef to Flux and Upgrade VPC CNI. #749

Merged
merged 14 commits into from
Jun 30, 2023

Conversation

elamaran11
Copy link
Collaborator

Issue #, if available:

Description of changes:
This PR takes care of Upgrading Grafana Operator, Adding SecretRef to Flux and Upgrading VPC CNI.

By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of your choice.

Copy link
Collaborator

@shapirov103 shapirov103 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@elamaran11 do you mind outlining a solution with blueprints that shows how to create that secret in the first place, make it a dependency for the flux add-on and inject?

@elamaran11
Copy link
Collaborator Author

@elamaran11 do you mind outlining a solution with blueprints that shows how to create that secret in the first place, make it a dependency for the flux add-on and inject?

@shapirov103 Added doc update for this comment.

@elamaran11
Copy link
Collaborator Author

/do-e2e-tests

@elamaran11 elamaran11 changed the title Upgrade Grafana Operator, Add SecretRef to Flux and Upgrade VPC CNI. Windows Node Group Support, Upgrade Grafana Operator, Add SecretRef to Flux and Upgrade VPC CNI. Jun 29, 2023
Copy link
Collaborator

@shapirov103 shapirov103 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

One comment

@@ -29,6 +29,10 @@ const blueprint = blueprints.EksBlueprint.builder()
.build(app, 'my-stack-name');
```

## Secret Management for private Git repositories
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Have you tried it? I am not sure how exactly dependency is handled between aws provider, secret creation and flux installation.

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yeah, i did try to create secret with external secrets to access a repo.

Copy link
Collaborator

@shapirov103 shapirov103 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Make sure make lint is success.

userData: userData,
}
}
addGenericNodeGroup(),
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nice, thank you for doing this!

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks.

@elamaran11
Copy link
Collaborator Author

Make sure make lint is success.

Fixed all lint issues,

Copy link
Collaborator

@shapirov103 shapirov103 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Awesome work. One minor comment and a question.

docs/addons/fluxcd.md Outdated Show resolved Hide resolved
lib/addons/vpc-cni/index.ts Show resolved Hide resolved
@shapirov103
Copy link
Collaborator

/do-e2e-tests

Copy link

@aws-ia-ci aws-ia-ci left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

end to end tests passed

@elamaran11 elamaran11 merged commit 1a8c8c4 into main Jun 30, 2023
@shapirov103 shapirov103 deleted the fix/fluxAndVpcCNI branch June 30, 2023 19:14
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
3 participants