Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

AppController pod could expose a read-only API #77

Open
nebril opened this issue Sep 19, 2016 · 3 comments
Open

AppController pod could expose a read-only API #77

nebril opened this issue Sep 19, 2016 · 3 comments

Comments

@nebril
Copy link
Contributor

nebril commented Sep 19, 2016

This task is about getting rid of kubectl exec k8s-appcontroller ac-run hacks and providing AppController pod service.

This issue is about allowing AppController to expose information about it's state.

@pigmej
Copy link
Contributor

pigmej commented Sep 20, 2016

Exposing API is not that easy, it will require adding Authentication/Authorization probably SSL etc. With exec approach we can rely on k8s mechanisms.

I think we for sure will need API when we will have a very big reason for that. And yeah, exec approach seems to be hacky :) Maybe we should adjust it instead?

@nebril
Copy link
Contributor Author

nebril commented Sep 20, 2016

OK, I will change this task to be about Read-only API that would provide information about deployments (most importantly, it's state)

@nebril nebril changed the title AppController pod should expose an API AppController pod should expose a read-only API Sep 20, 2016
@pigmej
Copy link
Contributor

pigmej commented Oct 4, 2016

For state we went with #90

@pigmej pigmej changed the title AppController pod should expose a read-only API AppController pod could expose a read-only API Feb 21, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants