Skip to content

Support for resource discovery #1585

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
mikestef9 opened this issue Dec 7, 2022 · 4 comments
Open

Support for resource discovery #1585

mikestef9 opened this issue Dec 7, 2022 · 4 comments
Labels
kind/enhancement Categorizes issue or PR as related to existing feature enhancements. lifecycle/frozen Indicates that an issue or PR should not be auto-closed due to staleness. priority/awaiting-more-evidence Lowest priority. Possibly useful, but not yet enough support to actually get it done. service/all Indicates issues or PRs related to all the service controllers. target/2026 Issues scheduled for 2026

Comments

@mikestef9
Copy link

mikestef9 commented Dec 7, 2022

Is your feature request related to a problem?
Many AWS resources that can be provisioned by ACK require subnets and/or security groups as an input, such as RDS databases. However, organizations typically have VPC infrastructure managed by separate networking teams. This requires lots of coordination to pass around subnets IDs to ACK managed resources.

Describe the solution you'd like
The ability for ACK to discover resources that it doesn't manage (potentially via tags). This could be done by a separate controller (discovery-controller?) with a separate installation flow + documentation, and caveats & warnings about how this is not a true GitOps approach. But this would provide a good interim approach until all resources are managed through ACK.

Describe alternatives you've considered
We are working around by this copying subnets IDs from other places, and hardcoding into resources like SubnetGroup with RDS. However, this puts additional burden on developers, who ideally shouldn't care about subnets in this scenario.

@mikestef9 mikestef9 added the kind/enhancement Categorizes issue or PR as related to existing feature enhancements. label Dec 7, 2022
@jljaco jljaco added the service/all Indicates issues or PRs related to all the service controllers. label Dec 7, 2022
@ack-bot
Copy link
Collaborator

ack-bot commented Mar 8, 2023

Issues go stale after 90d of inactivity.
Mark the issue as fresh with /remove-lifecycle stale.
Stale issues rot after an additional 30d of inactivity and eventually close.
If this issue is safe to close now please do so with /close.
Provide feedback via https://github.com/aws-controllers-k8s/community.
/lifecycle stale

@ack-prow ack-prow bot added the lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. label Mar 8, 2023
@a-hilaly
Copy link
Member

a-hilaly commented Mar 8, 2023

/lifecycle frozen

@ack-prow ack-prow bot added lifecycle/frozen Indicates that an issue or PR should not be auto-closed due to staleness. and removed lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. labels Mar 8, 2023
@a-hilaly a-hilaly added priority/awaiting-more-evidence Lowest priority. Possibly useful, but not yet enough support to actually get it done. lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. and removed lifecycle/frozen Indicates that an issue or PR should not be auto-closed due to staleness. labels Mar 8, 2023
@ack-bot
Copy link
Collaborator

ack-bot commented Apr 7, 2023

Stale issues rot after 30d of inactivity.
Mark the issue as fresh with /remove-lifecycle rotten.
Rotten issues close after an additional 30d of inactivity.
If this issue is safe to close now please do so with /close.
Provide feedback via https://github.com/aws-controllers-k8s/community.
/lifecycle rotten

@ack-prow ack-prow bot added lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed. and removed lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. labels Apr 7, 2023
@a-hilaly
Copy link
Member

a-hilaly commented Apr 7, 2023

/lifecycle frozen

@ack-prow ack-prow bot added lifecycle/frozen Indicates that an issue or PR should not be auto-closed due to staleness. and removed lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed. labels Apr 7, 2023
@eqe-aws eqe-aws added 2026 and removed 2026 labels Feb 5, 2025
@eqe-aws eqe-aws added the target/2026 Issues scheduled for 2026 label Feb 14, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/enhancement Categorizes issue or PR as related to existing feature enhancements. lifecycle/frozen Indicates that an issue or PR should not be auto-closed due to staleness. priority/awaiting-more-evidence Lowest priority. Possibly useful, but not yet enough support to actually get it done. service/all Indicates issues or PRs related to all the service controllers. target/2026 Issues scheduled for 2026
Projects
None yet
Development

No branches or pull requests

5 participants