-
Notifications
You must be signed in to change notification settings - Fork 1.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Set proxy-injector, tap-injector and jaeger-injector mutating webhook rules scope to Namespaced #12195
Set proxy-injector, tap-injector and jaeger-injector mutating webhook rules scope to Namespaced #12195
Conversation
961815f
to
28880c2
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Great fix, thanks!
To fix the tests, please run go test ./... -update
to recreate the test fixtures 😉
... and also please address the DCO |
44e6544
to
50af07d
Compare
@alpeb |
Subject: Setting the scope for mutating webhooks rules Problem: The linkerd-proxy-injector-webhook-config, linkerd-jaeger-injector-webhook-config, and linkerd-tap-injector-webhook-config mutating webhooks raise a warning on GKE that says "Update webhook to no longer intercept system requests." in the GCP console recommendation section. This is because the scope is set to *. This also happens if scope is Namespaced, and kube-system and kube-node-lease namespaces are not excluded using namespaceSelector. Solution: Setting the scope to Namespaced for both webhooks, and the user can set the namespaceSelector in the helm values. Validation: This should not change the webhooks behaviour as all webhooks are triggered only by pod/service creation requests, and pods/services are namespaced resources. Fixes #12193 Signed-off-by: f.medini <f.medini@nyris.io>
50af07d
to
5e93d04
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM, thanks @mdnfiras !
… rules scope to Namespaced (linkerd#12195) * Set mutating webhook rules scope to Namespaced Problem: The linkerd-proxy-injector-webhook-config, linkerd-jaeger-injector-webhook-config, and linkerd-tap-injector-webhook-config mutating webhooks raise a warning on GKE that says "Update webhook to no longer intercept system requests." in the GCP console recommendation section. This is because the scope is set to *. This also happens if scope is Namespaced, and kube-system and kube-node-lease namespaces are not excluded using namespaceSelector. Solution: Setting the scope to Namespaced for all webhooks, and the user can set the namespaceSelector in the helm values. Validation: This should not change the webhooks behaviour as all webhooks are triggered only by pod/service creation requests, and pods/services are namespaced resources. Fixes linkerd#12193 --------- Signed-off-by: f.medini <f.medini@nyris.io> Co-authored-by: Alejandro Pedraza <alejandro@buoyant.io> Signed-off-by: Mark S <the@wondersmith.dev>
Subject: Setting the scope for mutating webhooks rules
Problem: The linkerd-proxy-injector-webhook-config, linkerd-jaeger-injector-webhook-config, and linkerd-tap-injector-webhook-config mutating webhooks raise a warning on GKE that says "Update webhook to no longer intercept system requests." in the GCP console recommendation section. This is because the scope is set to *. This also happens if scope is Namespaced, and kube-system and kube-node-lease namespaces are not excluded using namespaceSelector.
Solution: Setting the scope to Namespaced for all webhooks, and the user can set the namespaceSelector in the helm values.
Validation: This should not change the webhooks behaviour as all webhooks are triggered only by pod/service creation requests, and pods/services are namespaced resources.
Fixes #12193