Open aqeelat opened 1 week ago
AFAIK, there is no official statement whether labels and annotations should be propagated to child objects. Some people prefer this behavior (link), but a Kubernetes dev mentions that it's not desirable that labels propagate (link).
Not propagating labels and annotations would be an easy change and we should add a statefulsetMetadata
field that will hold the annotations/labels for the generated statefulset. However this may break existing installations, so we can't make this change that easy. It would require a migration path:
preventMetadataPropagation
field (defaults to false
) to the Tenant
CRD that will disable propagation of annotation/labels.statefulsetMetadata
field in the Tenant
CRD that will add annotations/labels to the generated statefulset.In the next major release of the operator the preventMetadataPropagation
field can be removed, because we can only have these kind of breaking changes in major releases.
When the operator syncs the tenant, it copies the labels and annotations from the Tenant to the StatefulSet, causing undesirable side effects.
Expected Behavior
Similar to how the Service metadata are synced, the labels and annotations that should be cascaded to the StatefulSet should be explicitly specified in the CRD.
Current Behavior
https://github.com/minio/operator/blob/03613d29e55730ff75f2dbfa70a15e2c4c7ea9db/pkg/resources/statefulsets/minio-statefulset.go#L630-L632
Possible Solution
poolsMetadata
for the labels and annotations that are shared across all pools.cascadeTenantMetadata
that controls the lines in the snippet above.Steps to Reproduce (for bugs)
Context
I opened #2287 before investigating the issue but now I think I have more context to discuss the issue.
Because the operator cascades the argocd label to the stateful set, cilium thinks that this label is a security-relevant label, and uses it to create endpoints for the pods and the identity object that governs these endpoints. The issue appears because the identity object has the argocd label, which makes argo thinks that it is a top level object, but when it compares it with the actual application manifest, it does not find it there. Therefore, argo will think that this object was removed from the manifest and will try to remove it from the cluster as well.
We're using many other operators such as Percona, ECK, PGO, but we only see this behavior with the Minio Operator. Once this issue is fixed, the operator can be declared GitOps friendly.
Regression
The issue first appeared in #295
Your Environment
minio-operator
): 6.0.2uname -a
):