Replies: 3 comments
-
Don't forget delta-proxy too, proxy-minion should have it covered but want to keep delta-proxy in the loop too |
Beta Was this translation helpful? Give feedback.
-
I keep meaning to push a SEP for this (but I keep getting distracted by my day job) but there are six things that I think are missing from salt, two of which I think are relevant here (bear with me if they are not immediately obvious):
The implications of this are huge for salt content.
As you can imagine, I got really excited about the delta-proxy when I heard about it because it takes a big step toward this vision. I had a quick discussion with Tom about this in early 2019 and his eyes went off into the distance and he said, "hmm.. the number of minions could increase exponentially" (I disagree btw, as we could be choosy about which platforms become first-class minions). Then we had to go to a meeting and the subject got dropped. But it's been bugging me for my entire time in working with salt. Anyway, getting to the point.... If I extend that architectural pattern to this situation my "ideal" solution is a new vsphere "delta-proxyesque" minion (see "2", above) [that replaces the old salt-proxy minions], such that:
Architecturally, this is very clean and the user experience is dead easy - simply configure the minion to talk to vSphere and everything else is managed for your. No management of separate url/endpoint/credentials for each for salt-proxy or delta-proxy. And each esxi host/cluster/datacenter/vcenter has an identity (per "2", above) and a clearly defined platform (per "1", above). As I lament in #257, the SDDC modules were written to mirror the vSphere API which operates on multiple systems with a single call using filters. That is not how salt works - nor should it. Effective management and compliance reporting requires that managed assets have identity. So, to me, the minion (of whatever form) should be responsible for being the abstraction layer between those two completely different ways of working. Most of the above is specifically related to the vSphere modules (and, I suspect, is less relevant to NSX-T, etc). But again, having specific delta-proxy minions for NSX-T, vROPs, etc, etc, etc shouldn't be that onerous (in fact, I think it's quite light) and it would give them identity inside of salt, and I think that is very important. I realize that, as a solution, this is a much larger turn of the crank than defining profiles (per this discussion) because it redefines how we think of a minion. But having a separate project like the sddc modules might be a place to start developing the concept for eventual inclusion into the main salt project. |
Beta Was this translation helpful? Give feedback.
-
@waynew Today, I was working with single ESXi hosts and realised that even though the I'm thinking should we drop the extra key
How does it matter in this case to have an additional key to denote the list is for If this seems feasible, I'll make the necessary changes today itself. Otherwise, we need to modify the entire code to pass |
Beta Was this translation helpful? Give feedback.
-
I've been kicking this around for a while - I don't have completely solid thoughts on the matter, so I figure it would be a good discussion point for here. I think that we want to use
saltext.vmware
as our top-level config option. So we might have something like:Alternatively, if we have profiles:
Does this seem like a reasonable layout to everyone? Is there something that I'm missing or forgetting here? In particular I'm thinking about how cloud profiles and proxy minions would work here as well, because those are the sorts of things that we'll want to support going forward. I can envision, for instance, using Salt to spin up vms in vCenter and then manage them as proxy minions. Or other vms would be managed as native minions.
I just want to make sure that we can provide this config data as seamlessly as possible.
Beta Was this translation helpful? Give feedback.
All reactions