{
"newrelic-n/a": [ {
"credentials": {
"licenseKey": "12345678"
},
"label": "newrelic-n/a",
"name": "new-relic",
"plan": "standard",
"tags": []
} ]
}{
"user-provided": [ {
"credentials": {
"licenseKey": "12345678"
},
"label": "user-provided",
"name": "application-mointoring",
"tags": []
} ]
}
To unsubscribe from this group and stop receiving emails from it, send an email to vcap-dev+u...@cloudfoundry.org.
When we get to it, the feature would be added to the go-cli, not the ruby-cli.
To unsubscribe from this group and stop receiving emails from it, send an email to vcap-dev+u...@cloudfoundry.org.
We're planning a public beta release soon, most likely next week. Feedback from the community and final feature work will dictate the timing of the final release, so we'll all know more after the beta.
I really like Mike's suggestion of keying off of a New Relic specific key in credentials. This is something users already have the ability to input and would work for both managed and user-provided instances. Ben, will that work for you? It seems like this would solve Matt Stine's use case as well, if spring-cloud could identify a rabbit service by 'uri: amqp://...', for example. For Nic's use case, wouldn't the credential 'smtp_host' provide sufficient info?
It seems like it can't hurt (they can just be ignored) and potentially allow behavior we haven't yet thought of.
I dislike this because what it's actually doing is moving the tagging into the payload field. It pollutes a clean naming (e.g. I assume that licenseKey is in the NR team's ubiquitous language, newRelicLicenseKey is not) that each service would ideally like to use. What we're effectively saying to service providers is that their payload keys now need to be unique within the context of all possible service payloads rather than simply unique with their payload.
To unsubscribe from this group and stop receiving emails from it, send an email to vcap-dev+u...@cloudfoundry.org.
I'm not in any way saying that using "newRelicLicenseKey" be the end all solution. I'm saying that it is a hack that can be done for now. IMO an only slightly worse hack than using a tag on a user provided service. Do you disagree Ben that prompting for a key as part of the creation of an actual new-relic service is the better way of handling this use case long term? I don't really care what hack you use but it would be unfortunate if implementing the tags hack distracted from the real solution of being able to provide service specific data to services at creation time.
Well, that only works for services that are both user-provided and platform-provided. In fact, New Relic is only an example on http://run.pivotal.io as it won't be available by default to on-premise users. In fact, I don't believe that there are any services included by default at all any more. If we went with the 'provide your own credentials when creating a service' model, then we'd also have to support the user-provided style as well for cases where there is no service binding for the type the user wants to bind (another example would be an Oracle database). If we've got to support the user-provided style no matter what, why don't we go for a single unified solution (tags) that works for all cases?
--
You received this message because you are subscribed to the Google Groups "Cloud Foundry Developers" group.
To view this discussion on the web visit https://groups.google.com/a/cloudfoundry.org/d/msgid/vcap-dev/37894e30-4e4a-4df7-a8b0-d11d35334e65%40cloudfoundry.org.
To view this discussion on the web visit https://groups.google.com/a/cloudfoundry.org/d/msgid/vcap-dev/CAM766KnWJGsGjBb3xU7gVZGnCEY6R7VgcUv-TK51uibFP8ZkFg%40mail.gmail.com.
To view this discussion on the web visit https://groups.google.com/a/cloudfoundry.org/d/msgid/vcap-dev/5f54c51c-dba4-4314-b7ef-05763a5e5142%40cloudfoundry.org.
To view this discussion on the web visit https://groups.google.com/a/cloudfoundry.org/d/msgid/vcap-dev/CAM766KmvQMpS5UozbZ-D3YWX7CpVf9oP-ewN6P4a-20j%3D9LKgQ%40mail.gmail.com.
Actually, the use of tag for annotating bound service instances would require more than currently documented into VCAP_SERVICES: it needs a key/value pair tag similar at what AWS offers to set on resources and not just an array of tag names [2] .
[
'relational',
'postgres',
'session-replication',
'jndi=java:app/MyDataSource',
'jdbc=http://central.maven.org/...',
'connections=25'
]Also the key/value tag pairs attached should be attacheable on the service instance and/or service bindings. Service binding by default getting tags assigned to service instance, unless overriden in the bind-service request.
--You received this message because you are subscribed to a topic in the Google Groups "Cloud Foundry Developers" group.To view this discussion on the web visit https://groups.google.com/a/cloudfoundry.org/d/msgid/vcap-dev/b221e445-4ee6-4ee1-9065-2a32da16ec4c%40cloudfoundry.org.
--To view this discussion on the web visit https://groups.google.com/a/cloudfoundry.org/d/msgid/vcap-dev/CAJKcadV_Ga0ZCeHVY8jVX_WPJtNPbkcDm0pFxNRQcq_zZS84WA%40mail.gmail.com.
You received this message because you are subscribed to the Google Groups "Cloud Foundry Developers" group.
To view this discussion on the web visit https://groups.google.com/a/cloudfoundry.org/d/msgid/vcap-dev/CAEoPEDpvCPQvUQQ5Cip68uzGgyxfVLQkHqPrgGfau5DUpyy_ww%40mail.gmail.com.
To view this discussion on the web visit https://groups.google.com/a/cloudfoundry.org/d/msgid/vcap-dev/CAJKcadW4vginjf2gXPL%3DjRt877oDKim%3D%2BG04YX%3DdsC2X16W7mg%40mail.gmail.com.
To view this discussion on the web visit https://groups.google.com/a/cloudfoundry.org/d/msgid/vcap-dev/CAEoPEDpd6Ge5%3DBhF-TfTxWXsEv6rk%3DuUMuyfAgvx_vSsCaNELg%40mail.gmail.com.
To view this discussion on the web visit https://groups.google.com/a/cloudfoundry.org/d/msgid/vcap-dev/CAJKcadW4vginjf2gXPL%3DjRt877oDKim%3D%2BG04YX%3DdsC2X16W7mg%40mail.gmail.com.
To view this discussion on the web visit https://groups.google.com/a/cloudfoundry.org/d/msgid/vcap-dev/C22B5052-723C-4956-9458-B3FF6EF421FC%40orcon.net.nz.