-
Notifications
You must be signed in to change notification settings - Fork 980
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Re-design how Fluentd should be deployed as a Daemonset #43
Comments
One of the biggest pain points is plugins. I'd like to experiment with a few ideas, when I find some more time, but I'll put them here so others can feel free to try it if they like:
I'm not a huge fan of option 3, but I am curious to see how well it works in practice since the pods only need to install the gems the first time they're started, restarts wouldn't need to re-download the gem, only if the pod is re-created does it need to re-download, so this may work for some use cases. By building a base image containing everything except output plugins specific to usage with Kubernetes, it's really easy to extend the image with your own modifications, for your specific logging destination, and if you don't care about the size as much, the all-in-one image would have most output plugins people need already installed. |
* Makes builds more deterministic * Avoids issues with plugin incompatibility with fluentd version * Vulnerability scanning from github * ~ moves a little closer to solving fluent#43 perhaps * Fixes fluent#27 Signed-off-by: Ed Robinson <[email protected]>
Current structure of this suggested way to deploy Fluentd as a daemonset is generating some complications to maintain different based distro, plugins and different setups.
Taking in count @chancez suggestions, I think this could work as:
Please share your thoughts and ideas.
The text was updated successfully, but these errors were encountered: