Closed haibo2685 closed 4 months ago
@haibo2685 Please share more details on CIS feature request along with CIS configuration.
This requirement can be achieved by having copy of same svc for the other deployment.
Specific scenario requirements: When k8s administrators deploy yaml files to CIS, they can directly issue parameter configurations through the yaml file and automatically disable the member on f5.
@haibo2685 Any example you can share for this scenario ? Please share more details on CIS feature request along with CIS configuration.
After the pool and members provisioned on BIG-IP, customer want to do manual operation on members' state(changing to user-disabled), however, this operation would be reset by CIS in the next AS3 declarative deployment. That's not expected by customer. They want to keep the state as manually setted.
@haibo2685 We could do this for the entire pool but not a member.
@haibo2685 Is CIS configured in nodeport or clusterIP mode ? What resources is CIS monitoring?
clusterIP mode、namespace
@haibo2685 We need more clarity on customer usecase.
1、AS3 ConfigMap 2、that is not in HubMode 3、Yes,keep this pool member disabled during subsequent service updates
1、AS3 ConfigMap 2、that is not in HubMode 3、Yes,keep this pool member disabled during subsequent service updates
Created [CONTCNTR-4744] for internal tracking.
Added support for cis.f5.com/disableMembers annotation for AS3 configmaps to allow users to provide the names of the deployments for disabling the pool members associated with them.
Resolved in CIS 2..18 - https://clouddocs.f5.com/containers/latest/reference/release-notes.html
Title K8s administrators can manually disable pool members
Description
k8s administrators can manually disable a member corresponding to a certain k8s service and keep this pool member disabled during subsequent service updates.
Actual Problem
At present, the deployment method is two deployments corresponding to the same SVC. When scrolling to update one of them, the F5 administrator needs to manually set the port lockdown of the F5 interface to none to not receive CIS updates, and then disable the pool member of this deployment on the device. The business team cannot accept the failure time of health detection