-
Notifications
You must be signed in to change notification settings - Fork 99
chart: add network policies #708
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
Signed-off-by: Marco Ebert <[email protected]>
jgehrcke
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
|
@jgehrcke: Yes, it did. If you're interested I can come up with Helm unit testing in a separate PR. We're using the Helm Unit Tests plugin at Ingress NGINX for some basic testing. Additionally you could use the Helm Chart Testing tool in conjunction with KIND to deploy and test the chart. Shall I first create an issue to have a discussion? |
|
Ah, and one more thought on this PR: I chose ports 443 and 6443 because they are common, but I am not sure if it would actually be a better idea to have them configurable, since this network policy hard-codes egress to any destination via 443 and 6443. |
|
@shivamerla can you have a look at this patch? |
|
@jgehrcke LGTM. This gives users a sensible baseline. If additional customization (restricted IP CIDR, namespaces) is needed, cluster admins can continue deploying their own policies and leave it disabled in the helm chart. I don't think we need to make the egress rules/ports customizable and complicate this. |
When deploying the chart to clusters with network access restricted by network policies, you might not be able access the API server.
This PR adds network policies for the controller and kubelet plugin, so they can access the API server in such environments.