Giter Site home page Giter Site logo

Comments (6)

JoelColledge avatar JoelColledge commented on August 16, 2024

I don't know much about this feature, but here are my thoughts anyway.

Do we want to enable the topology feature?

Yes

If yes, do we want it configurable?

Yes

If yes, what should the default?

No. We do want to make it easy to try out the operator, but we don't want to lay traps for people who scale up with the default settings. To use this feature, the user must perform some additional steps to configure the topology information, so a user who is just trying out the operator probably won't benefit from it anyway. Also, there is some overlap between what this does and Stork and it might be confusing to have both running.

from piraeus-operator.

JoelColledge avatar JoelColledge commented on August 16, 2024

This is actually a duplicate of #48, right?

from piraeus-operator.

WanzenBug avatar WanzenBug commented on August 16, 2024

You are right.

from piraeus-operator.

alexzhc avatar alexzhc commented on August 16, 2024

CSI topology is especially needed when provisioning pure lvm volumes, which have no magic of drbd diskless for remote attachment.

from piraeus-operator.

alexzhc avatar alexzhc commented on August 16, 2024

People need native lvm/zvol volumes for performance applications like mysql cluster. Using stork for those pure lvm volumes is an overshoot. I would suggest leaving --feature-gates=Topology=true by default, and then only recognizing it with StorageClass parameter placementPolicy: FollowTopology

from piraeus-operator.

WanzenBug avatar WanzenBug commented on August 16, 2024

One thing to also mention: The current implementation of this feature in linstor-csi, while better than the old one, is by no means perfect. A stumbling block that is probably very easy to run into: The accessible topologies of a node are only ever queried on plugin start. That means that any storage pool that is later added via LINSTOR API will not show up as accessible by the node. Only a restart of the node pod would trigger another check for new storage pools.

This is a limitation of the way kubernetes chose to implement the node info collection. I have not found a good workaround for this problem yet. This led me to disable this feature by default.

from piraeus-operator.

Related Issues (20)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.