Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

New scenario to claim a service #2

Open
cmoulliard opened this issue Sep 22, 2022 · 0 comments
Open

New scenario to claim a service #2

cmoulliard opened this issue Sep 22, 2022 · 0 comments
Labels
analysis Investigate and analyse how the use case should be designed, coded, ...

Comments

@cmoulliard
Copy link
Contributor

cmoulliard commented Sep 22, 2022

New scenario to claim a service

Here is how I think we should manage on the new platform the Service and Credentials binding :

  1. When an application requires to access a service AND to get the needed credentials + URL, then they will post a ServiceClaim (e.g: Postgresql, version 10, namespace x.y.z or cluster A)
  2. The ServiceBox will query the Skupper VAN to figure out if a service of type + version matching the criteria exist (one of the endpoints)
  3. If a Skupper endpoint exists, then the URL will be returned
  4. If no skupper endpoint exists, then a service could be instantiated if the KCP registry contains a service of type + version (= GVK)
  5. kcp and skupper creates an instance in a cluster (or when specified within the target cluster and/or namespace) and register the endpoint
  6. Ideally, we should use a system like (https://www.vaultproject.io/docs/secrets/databases) able to generate/populate the credentials of the service and to register them using the service ADMIN. Why: Many customers will never accept that a kubernetes controller generates a user/pwd, create a k8s secret BUT instead will prefer to have control over apps/users having credentials + if they can write/read/....
  7. The ServiceClaim is updated with the information: URL + credentials and SBO will then been able to mount the data within the pod/deployment/etc resource

Remark: The step 6 is definitively the most challenging !!

@cmoulliard cmoulliard added the analysis Investigate and analyse how the use case should be designed, coded, ... label Sep 22, 2022
@cmoulliard cmoulliard changed the title UC-1: Scenario to claim a service New scenario to claim a service Oct 10, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
analysis Investigate and analyse how the use case should be designed, coded, ...
Projects
None yet
Development

No branches or pull requests

1 participant