openshift-docs icon indicating copy to clipboard operation
openshift-docs copied to clipboard

[OSDOCS-4318]: Adds steps to use STS for 3rd-party Operators

Open jeana-redhat opened this issue 3 years ago • 4 comments

Version(s): 4.8+ (needs SME verification)

Issue: OSDOCS-4318

Link to docs preview:

QE review:

  • [ ] QE has approved this change.

Additional information: WIP draft with several open items

jeana-redhat avatar Oct 11 '22 20:10 jeana-redhat

🤖 Updated build preview is available at: https://51541--docspreview.netlify.app

Build log: https://circleci.com/gh/ocpdocs-previewbot/openshift-docs/8546

ocpdocs-previewbot avatar Oct 11 '22 20:10 ocpdocs-previewbot

I am not sure why the output currently has so many step 1.s but I guess I will figure that out later. This is edited based on initial feedback, still has some open questions and missing details (see // comments in file view).

jeana-redhat avatar Oct 12 '22 21:10 jeana-redhat

Fixed steps numbering

jeana-redhat avatar Oct 13 '22 13:10 jeana-redhat

Most recent push removes conditions and assumes the user needs to create a CR no matter what. (I left the lines in block comments for now in case we reconsider that. Block comments also cause the numbering to restart but will be fixed when finalized)

jeana-redhat avatar Oct 13 '22 17:10 jeana-redhat

The branch/enterprise-4.13 label has been added to this PR.

This is because your PR targets the main branch and is labeled for enterprise-4.12. And any PR going into main must also target the latest version branch (enterprise-4.13).

If the update in your PR does NOT apply to version 4.13 onward, please re-target this PR to go directly into the appropriate version branch or branches (enterprise-4.x) instead of main.

bergerhoffer avatar Jan 16 '23 20:01 bergerhoffer

🥇 /lgtm

mtulio avatar Jan 19 '23 18:01 mtulio

Looks good to me!

abutcher avatar Jan 19 '23 18:01 abutcher

@jianping-shu this is ready for verification, PTAL :bow:

Cc: @duanwei33 - this PR replaces the content you verified in #44136 last year.

jeana-redhat avatar Jan 19 '23 18:01 jeana-redhat

New changes are detected. LGTM label has been removed.

openshift-ci[bot] avatar Jan 19 '23 18:01 openshift-ci[bot]

@jeana-redhat LGTM except for the above minor issue

jianping-shu avatar Jan 20 '23 11:01 jianping-shu

@jeana-redhat One more thing came into my mind, shall we still keep the EFS CredentialsRequest YAML file as before? Otherwise the user can't get the info about permission/serviceAccountNames as in the original yaml example. So in the procedure of AWS Elastic File Service CSI Driver Operator, we shall NOT do "oc get credentialsrequest", instead we shall follow the original step "2. Create and save an EFS CredentialsRequest YAML file..." as in https://github.com/openshift/openshift-docs/pull/44136,

jianping-shu avatar Jan 20 '23 11:01 jianping-shu

@jianping-shu Does the user need to know the ServiceAccount name / permissions required if processing the CR with ccoctl? I think having the operator install the CR for the user to oc get would be preferred it so that the documentation doesn't need to be updated when the permissions change in the CredentialsRequest? What do you think?

abutcher avatar Feb 02 '23 16:02 abutcher

@abutcher Yes, if the CR exists, that should be the ideal design and right way to go.

But CR didn't exist when we performed the STS step in today's testings.

@duanwei33 helped to try the procedure on an aws cluster whose cco mode is 'passthrough' After performed step 2 of Installing the AWS EFS CSI Driver Operator, The CR openshift-aws-efs-csi-driver was NOT created. After performed step 4 Install the AWS EFS CSI Driver (step 3 is NOT needed since not STS). The CR openshift-aws-efs-csi-driver and its corresponding secret were created successfully

I had a test on aws sts cluster. After performed step 2 of Installing the AWS EFS CSI Driver Operator, The CR openshift-aws-efs-csi-driver was NOT created. Then I bypassed step 3 for STS (to find out if/when CR created) and performed step 4 Install the AWS EFS CSI Driver directly. The CR openshift-aws-efs-csi-driver was still NOT created, and efs csi operator pods can't start successfully jianpingshu@jshu-mac OSDOCS-4318 % oc -n openshift-cluster-csi-drivers get pod | grep aws-efs-csi-driver-controller aws-efs-csi-driver-controller-69d45bb9c-k5zzf 0/4 ContainerCreating 0 77m aws-efs-csi-driver-controller-69d45bb9c-kxfc5 0/4 ContainerCreating 0 77m

Seems AWS EFS CSI Driver has the different behaviors when cco mode are in non-manual and manual. But after step 2 i.e. installing operator from operatorHub, CR doesn't exist yet so the current procedure can't work as expected. For short term solution, I think maybe we can still paste EFS CredentialsRequest YAML file on the doc as before. For long term, we can suggest the developers of 3rd party operator to follow the way of inserting CR as soon as installing the operator.

jianping-shu avatar Feb 03 '23 11:02 jianping-shu

Thanks for the detailed explanation @jianping-shu, it is really helpful! I will think about how to get this taken care of in docs for now :slightly_smiling_face:

jeana-redhat avatar Feb 03 '23 13:02 jeana-redhat

Issues go stale after 90d of inactivity.

Mark the issue as fresh by commenting /remove-lifecycle stale. Stale issues rot after an additional 30d of inactivity and eventually close. Exclude this issue from closing by commenting /lifecycle frozen.

If this issue is safe to close now please do so with /close.

/lifecycle stale

openshift-bot avatar May 10 '23 01:05 openshift-bot

PR needs rebase.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

openshift-merge-robot avatar May 10 '23 01:05 openshift-merge-robot

Suggest to hold this PR because OCPBU-4 is going to rework AWS STS mechanism.

jianping-shu avatar May 16 '23 03:05 jianping-shu

@jianping-shu that makes sense. Probably for the best, I failed twice trying to fix this rebase file-by-file, so a fresh start is in order anyway :)

jeana-redhat avatar May 16 '23 13:05 jeana-redhat

The branch/enterprise-4.14 label has been added to this PR.

This is because your PR targets the main branch and is labeled for enterprise-4.13. And any PR going into main must also target the latest version branch (enterprise-4.14).

If the update in your PR does NOT apply to version 4.14 onward, please re-target this PR to go directly into the appropriate version branch or branches (enterprise-4.x) instead of main.

kalexand-rh avatar May 16 '23 18:05 kalexand-rh

https://issues.redhat.com/browse/OSDOCS-4318?focusedId=22538844&page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel#comment-22538844

jeana-redhat avatar Jun 28 '23 17:06 jeana-redhat