Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

TLSPK Agent / Jetstack Agent (Re-branding) #431

Open
hawksight opened this issue Apr 26, 2023 · 0 comments
Open

TLSPK Agent / Jetstack Agent (Re-branding) #431

hawksight opened this issue Apr 26, 2023 · 0 comments

Comments

@hawksight
Copy link
Contributor

History

For anyone who doesn't know, what was formerly Jetstack Secure (which used the Jetstack Agent) is now known as TLS Protect for Kubernetes (TLSPK) (which also uses the Jetstack Agent).

Issue

I've had the same conversation at least 3 times now about renaming "X" to TLSPK. Where "X" is the name of the chart, the namespace we install into, etc. Obviously it causes some confusion and should be standardised. So here's the issue to discuss it.

Main Concern & Assumption

Changing the helm chart name, or the readme is not enough as the confusion or contradiction continues. There's the domain we host on and the organisation we host this project under.

TLS Protect for Kubernetes is a Venafi and the assumption is that the entire product including this agent would be re-branded to be consistent throughout.

Impacted resources

(possibly more, ran out of ideas)

Ideal Scenario

We work with the TLSPK product team to sort out what the end result should be and standardise around that. That could be: venafi/tlspk-agent. Until we know what the right naming should be, any work to rename parts could well be wasted effort.

What's next

I'd like to use this thread just to give some clarity to the open source side of Jetstack Secure / TLS Protect for Kubernetes around the terminology and branding here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant