Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I’m curious to know why this requires a whole CRD + operator setup, instead of just being a deployment that watches config(s) somewhere?


Presumably a CR can be validated by k8s against a schema and will fail at an early step. I admit I like the operator-pattern.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: