Giter Site home page Giter Site logo

kube-samples's Introduction

kube-samples's People

Contributors

aaroncollins avatar alchemydocs avatar arpadkun avatar artberger avatar attiss avatar bhpratt avatar bourne-id avatar bradbehle avatar calvinrzachman avatar derekpoindexter avatar evan-reilly avatar idanadar avatar joseph-goergen avatar jpapejr avatar jsloyer avatar kkronstainbrown avatar knperi avatar libesz avatar marissa-treible avatar mihivagyok avatar nfritze avatar rachael-graham avatar relyt0925 avatar rtheis avatar saikiranare avatar sanchezma5 avatar szombi avatar tamas-biro1 avatar willholley avatar yingyeliu avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

kube-samples's Issues

tailoredprofile.yaml needs indentation at line 8

oc apply -n openshift-compliance -f https://raw.githubusercontent.com/IBM-Cloud/kube-samples/master/roks-compliance-operator/tailoredprofile.yaml
error: error parsing https://raw.githubusercontent.com/IBM-Cloud/kube-samples/master/roks-compliance-operator/tailoredprofile.yaml: error converting YAML to JSON: yaml: line 8: did not find expected key

resolved with

apiVersion: compliance.openshift.io/v1alpha1
kind: TailoredProfile
metadata:
name: roks-cis-node
namespace: openshift-compliance
spec:
description: "IBM ROKS tailored scan"
setValues:

hook and tide pods are CrashLoopBackOff

i try to install Jenkinx X on IKS, i specify the --git-provider-url="https://github.ibm.com", however, the hook pods are CrashLoopBackOff, checking the logs for pods , shows:

{"client":"github","component":"hook","level":"info","msg":"User()","time":"2019-11-13T12:21:59Z"}
{"component":"hook","error":"error getting bot name: fetching bot name from GitHub: status code 401 not one of [200], body: {"message":"Bad credentials","documentation_url":"https://developer.github.com/v3\"}","level":"fatal","msg":"Error getting Git client.","time":"2019-11-13T12:21:59Z"}

,
it is very strange, hook used the public github instead of ibm github. How to fix this?

Missing tugboat IP for au-syd region

Applying the public network isolation policies to a cluster in au-syd (with logging enabled), shows that it's denying access to 135.90.69.82/32. This appear to be a valid tugboat IP, so should be allow-listed.

Separate Frankfurt IPs from AMS, PAR and MIL

Today, all CIDS for EU-CEntral are in one file [iam-firewall-ips-fra.txt](https://github.com/IBM-Cloud/kube-samples/blob/master/iam-firewall-ips/iam-firewall-ips-fra.txt)

Please only add Frankfurt CIDR in the Frankfurt file and keep AMS, PAR and MIL separate.

That will make the IP range to whitelist smaller for Frankfurt users only.

Thanks.

Secret Sync Operator fails if target namespace doesn't exist

The Secret Sync Operator will fail-fast if a target namespace doesn't exist with the following error:

{"level":"error","ts":1572685378.8804283,"logger":"kubebuilder.controller","msg":"Reconciler error","controller":"secretsync-controller","request":"kube-system/testreplication","error":"namespaces \"doesnotexist\" not found","stacktrace":"github.com/ibm/secret-sync-operator/vendor/github.com/go-logr/zapr.(*zapLogger).Error\n\t/go/src/github.com/ibm/secret-sync-operator/vendor/github.com/go-logr/zapr/zapr.go:128\ngithub.com/ibm/secret-sync-operator/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).processNextWorkItem\n\t/go/src/github.com/ibm/secret-sync-operator/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:217\ngithub.com/ibm/secret-sync-operator/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).Start.func1\n\t/go/src/github.com/ibm/secret-sync-operator/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:158\ngithub.com/ibm/secret-sync-operator/vendor/k8s.io/apimachinery/pkg/util/wait.JitterUntil.func1\n\t/go/src/github.com/ibm/secret-sync-operator/vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:133\ngithub.com/ibm/secret-sync-operator/vendor/k8s.io/apimachinery/pkg/util/wait.JitterUntil\n\t/go/src/github.com/ibm/secret-sync-operator/vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:134\ngithub.com/ibm/secret-sync-operator/vendor/k8s.io/apimachinery/pkg/util/wait.Until\n\t/go/src/github.com/ibm/secret-sync-operator/vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:88"} 

This causes the operator to go into a loop until the namespace is created and could prevent some secrets being synchronised.

The PR attached amends the logic by checking if the namespace exists first, bypassing any missing namespaces and creates all secrets where the namespace exists. The reconcile will requeue after 5 minutes if a missing namespace is detected as there is no namespace watch in this sample project and the secret may not be edited to retrigger the watch.

tailoredprofile.yaml missing description field

I noticed that "oc apply" will fail when loading the tailoredprofile.yaml and complains about a missing spec.description field:

% oc apply -n openshift-compliance -f https://raw.githubusercontent.com/IBM-Cloud/kube-samples/master/roks-compliance-operator/tailoredprofile.yaml
The TailoredProfile "roks-cis-node" is invalid: spec.description: Required value

I was doing this on an OpenShift 4.7 cluster. I have not looked at other versions of OpenShift.

I can resolve this by adding the line

    description: "IBM ROKS tailored scan"

in line 8 as shown below...

# For more information, see https://cloud.ibm.com/docs/openshift?topic=openshift-compliance-operator
apiVersion: compliance.openshift.io/v1alpha1
kind: TailoredProfile
metadata:
  name: roks-cis-node
  namespace: openshift-compliance
spec:
  description: "IBM ROKS tailored scan"
  setValues:

Thanks for the great resources!

Missing eu-de Control Plane CIDRS

These CIDRS for EU-DE Control Plane are mentioned in the IAM docs, but not in the region docs for eu-central. We have a customer hitting IP 161.156.188.198 which falls under CIDR 161.156.188.192/28 and is listed in THIS DOC

161.156.188.96/27
161.156.188.128/27
161.156.188.192/28
161.156.188.96/27

Issue copying secret name with more than 63 characters

Having issue syncing secret name with more than 63 characters
Docker image used : bourneid/secret-sync-operator
ERROR from secret-sync pod:
"error":"Secret "clustername-xxxxxxxxxxxxxxx-0001" is invalid: metadata.labels: Invalid value: "default.clustername-xxxxxxxxxxxxxxx-0001": must be no more than 63 characters",

Network Policies not applied in Kube-System ns

Hi All,

We are using calico network policy solution and except kube-system ns all other namespaces working fine controlling traffic according to network policies defined.

Right now, Kube-System ns allowing only all allow network policy and if we define any custom network policy, i am getting 502 bad gateway with [502][socket hang up][ECONNRESET] error.

Is there any restrictions IKS will apply on kube-system ns to not allow network policies?

Audit policy metadata-only rule should include `serviceaccounts/token` resource

The following files reference a metadata-only audit policy in order to prevent logging request/response contents for sensitive resources:

A recent Kubernetes bugfix means that audit-logging of subresource requests which previously failed will now log successfully. The serviceaccounts/token subresource responds to TokenRequest API calls with a newly minted service account token.

The serviceaccounts/token resource should also be included in the metadata-only audit policy if credentials are not intended to appear in the audit log:

- group: "" # core
  resources: ["secrets", "configmaps", "serviceaccounts/token"]

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.