RFC: Alert CR support for wildcard namespace #5432
Conversation
Signed-off-by: Dmitry Chepurovskiy <me@dm3ch.net>
7404d6e to
6772ca5
Compare
|
@matheuscscp You proposed to bring this feature discussions as a RFC. |
|
This RFC will hardly get through. I don't see anybody in the maintainers team interested in evaluating or considering the possibility of introducing a mechanism that breaks Kubernetes namespace isolation in such a... simplistic, or niche way. The Flux project has been historically trying to move away from this (a.k.a. If there's a big desire from the Flux community to have proper support for cross-namespace references, I'd lean more towards the
A specific point brought up in this similar RFC that I would be willing to consider is: It seems reasonable to me that cluster administrators may not want to share notification provider secrets with tenants. For this I would be willing to consider a controller-level flag that allows specifying a fallback secret in the same namespace of the controller pod (like we're gonna do here). Would this be useful? |
|
FWIW, I don't represent the whole flux community but as someone who administers several clusters of geo-distributed teams (that are not multi-tenant, but multi-ns), I'm not usually aware of what new Could I write a webhook that deploys a new |
/relates fluxcd/notification-controller#504
/relates fluxcd/notification-controller#71
/relates #4095
RFC covering support of monitoring all namespaces by Flux Alert.