Closed uhthomas closed 11 months ago
I recognise this behaviour is configurable with the LabelWhitelist
field, though I would urge the authors to reconsider the default behaviour. I would expect that with the introduction of ApplySets, pruning will become more popular and label propagation should be opt-in rather than opt-out. Either that, or an exception should be made specifically for applyset labels.
This issue is stale because it has been open for 45 days with no activity.
Closing an issue due to age isn't helpful for anyone.
This issue is stale because it has been open for 45 days with no activity.
This issue was closed because it has been inactive for 14 days since being marked as stale.
Expected behaviour
Kubernetes has introduced ApplySets, an improvement to server side apply and pruning.
https://kubernetes.io/blog/2023/05/09/introducing-kubectl-applyset-pruning/
ApplySets work by applying labels to objects it manages.
The applyset label should not be inherited, or else the created resources are pruned.
Actual behaviour
Steps to reproduce the behaviour
Create a
RedisFailover
object withKUBECTL_APPLYSET=true kubectl apply --server-side --applyset=some-apply-set --prune -f -
. Wait for the resources to be created, and then observe they are pruned when the original custom resource is applied again.Environment
How are the pieces configured?
Logs
N/A