- Nov 29, 2023
-
-
Botaniker (Bot) authored
-
- Nov 18, 2023
-
-
Sheogorath authored
-
Botaniker (Bot) authored
-
- Nov 17, 2023
-
-
Sheogorath authored
-
- Nov 14, 2023
-
-
Botaniker (Bot) authored
-
- Nov 08, 2023
-
-
Botaniker (Bot) authored
-
- Nov 06, 2023
-
-
Sheogorath authored
-
- Nov 05, 2023
-
-
Sheogorath authored
-
Sheogorath authored
-
Sheogorath authored
-
- Oct 31, 2023
-
-
Sheogorath authored
-
Sheogorath authored
-
- Oct 20, 2023
-
-
Sheogorath authored
-
- Oct 18, 2023
-
-
Botaniker (Bot) authored
-
- Sep 26, 2023
-
-
Sheogorath authored
-
Sheogorath authored
-
- Sep 25, 2023
-
-
Botaniker (Bot) authored
-
- Sep 16, 2023
-
-
Sheogorath authored
This patch adjusts the central oauth2-proxy resource to use `topologySpreadConstraints` instead of using `podAntiAffinity`. This helps with reducing the risk of Pending Pods e.g. during updates when also a pod config is adjusted.
-
- Sep 15, 2023
-
-
Sheogorath authored
-
- Sep 14, 2023
-
-
Sheogorath authored
-
- Sep 13, 2023
-
-
Sheogorath authored
This patch should make redis HA, which should eliminate another SPOF for goharbor. This is the first usage for the new redis operator.
-
- Jul 21, 2023
-
-
Sheogorath authored
-
- Feb 21, 2023
-
-
Sheogorath authored
-
Sheogorath authored
-
Sheogorath authored
-
- Nov 21, 2022
-
-
Sheogorath authored
This patch provides an initial version of shields for the cluster, deploying shields in a fairly locked down setup. This includes blocking all ingress and egress traffic except of the ingress controller, monitoring and outgoing web traffic to the public internet. As part of this some new shared network policies are created, added and renamed. These aim to improve the namespace isolation and provisioning of controlled network access.
-
- Sep 18, 2022
-
-
Sheogorath authored
-
- Sep 17, 2022
-
-
Sheogorath authored
This patch provides a new shared-config that can be used to allow access from kube-system and uses this NetworkPolicy to allow access to the new metallb AdmissionWebhook.
-
- May 10, 2022
-
-
Sheogorath authored
Add a very basic, shared policy to prevent ingress traffic for a namespace.
-
- Apr 24, 2022
-
-
Sheogorath authored
-
Sheogorath authored
This patch allows to monitor Postgresql Instances by allowing the monitoring namespace to access a exporter container port by default for spilo instances.
-
Sheogorath authored
This patch reduces the network acess from the database mangeement namespace to postgres-operator only. (Technically speaking there isn't anything else running in that namespace, but it helps to keep things tight in case of future expansions.)
-
Sheogorath authored
This patch reduces the network access from the monitoring namespaces to only prometheus.
-
- Apr 03, 2022
-
-
Sheogorath authored
This patch should help to better scale software on the cluster, CPU limits are not that big of a problem.
-
- Mar 27, 2022
-
-
Sheogorath authored
-
- Feb 04, 2022
-
-
Sheogorath authored
-
Sheogorath authored
Since kube-system is a bit delicate when it comes to blocking, this intial network policy tries to not block anything in order to keep everything working. This might be the solution to the globalnetworkpolicy issue.
-
- Feb 02, 2022
-
-
Sheogorath authored
-
Sheogorath authored
-
Sheogorath authored
This patch adds a new network policy to allow traffic from the monitoring namespace to access the exporter endpoints. Since it's not using allow right now, prometheus reports target down.
-