Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[bitnami/kafka] * Allow podSelector from any namespaceSelector #28719

Closed
wants to merge 7 commits into from

Conversation

tbotnz
Copy link

@tbotnz tbotnz commented Aug 7, 2024

Description of the change

Allow podSelector from any namespaceSelector to make kafka network policy behave like #12607 in the kafka chart

Benefits

Possible drawbacks

Applicable issues

#12607 #28720

Additional information

Checklist

  • Chart version bumped in Chart.yaml according to semver. This is not necessary when the changes only affect README.md files.
  • Variables are documented in the values.yaml and added to the README.md using readme-generator-for-helm
  • Title of the pull request follows this pattern [bitnami/<name_of_the_chart>] Descriptive title
  • All commits signed off and in agreement of Developer Certificate of Origin (DCO)

@github-actions github-actions bot added kafka triage Triage is needed labels Aug 7, 2024
@github-actions github-actions bot requested a review from carrodher August 7, 2024 03:20
@tbotnz tbotnz changed the title * Allow podSelector from any namespaceSelector [bitnami/kafka] * Allow podSelector from any namespaceSelector Aug 7, 2024
@tbotnz tbotnz force-pushed the main branch 2 times, most recently from 4db8117 to b37f7e1 Compare August 7, 2024 03:43
@carrodher
Copy link
Member

Thank you for initiating this pull request. We appreciate your effort. Just a friendly reminder that it's important to sign your commits. Adding your signature certifies that you either authored the patch or have the necessary rights to contribute the changes. You can find detailed information on how to do this in the “Sign your work” section of our contributing guidelines.

Feel free to reach out if you have any questions or need assistance with the signing process.

@tbotnz
Copy link
Author

tbotnz commented Aug 7, 2024

Thanks @carrodher, i've signed the commit as per below but the DCO check still fails.. does it need a newline after or something?

image

@carrodher
Copy link
Member

Following the instructions from the failing action should be enough, it is not needed to add new code. See https://github.com/bitnami/charts/pull/28719/checks?check_run_id=28440524888

* [bitnami/grafana-operator] Release 4.4.14 updating components versions

Signed-off-by: Bitnami Containers <[email protected]>

* Update CHANGELOG.md

Signed-off-by: Bitnami Containers <[email protected]>

---------

Signed-off-by: Bitnami Containers <[email protected]>
Signed-off-by: [email protected] <[email protected]>
@tbotnz
Copy link
Author

tbotnz commented Aug 7, 2024

Thanks @carrodher. Fixed - should be ready for your review now

Signed-off-by: Carlos Rodríguez Hernández <[email protected]>
Signed-off-by: Carlos Rodríguez Hernández <[email protected]>
@carrodher carrodher added verify Execute verification workflow for these changes in-progress labels Aug 7, 2024
@github-actions github-actions bot removed the triage Triage is needed label Aug 7, 2024
@github-actions github-actions bot removed the request for review from carrodher August 7, 2024 16:09
@github-actions github-actions bot requested a review from fmulero August 7, 2024 16:09
Signed-off-by: Bitnami Containers <[email protected]>
@tbotnz
Copy link
Author

tbotnz commented Aug 13, 2024

Just wondering if good to merge?

Copy link
Collaborator

@fmulero fmulero left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hi @tbotnz Thanks a lot for your contibution.

What do you think about applying these changes instead? #26597 Will they cover your needs?

Those changes are in our template (new charts should follow them) and we could apply them here

@tbotnz
Copy link
Author

tbotnz commented Aug 19, 2024

@fmulero i'm trying to move away from having to explicitly label namespaces instead, having a cluster wide pod label only that permits access, in line with how the redis chart works. It does not look like #26597 supports this

@fmulero
Copy link
Collaborator

fmulero commented Aug 20, 2024

If we apply the #26597 changes here I think you can cover your needs using the value ingressPodMatchLabels (without NS) That value is used to configure a podSelector based on pod labels, no namespace is needed. I think is worth a try.

@tbotnz
Copy link
Author

tbotnz commented Aug 20, 2024

Ok, thanks! when are you targeting release of #26597

@fmulero
Copy link
Collaborator

fmulero commented Aug 23, 2024

Ok, thanks! when are you targeting release of #26597

Sorry, maybe I didn't explain it very well. #26597 is in our template but that's not mean that we will apply those changes in short term to all our charts. Taking the advantage that you are changing the NetworkPolicy, Do those changes fit your needs? If that the case, Could you apply those changes here instead the solution you adopted?

@tbotnz
Copy link
Author

tbotnz commented Sep 3, 2024

@fmulero have tested this just now and it works, happy to close the PR if you wan't.

In general it'd be good to strive for consistency across charts for this type of thing (ie Redis's netpol still works in line with this PR)

@fmulero
Copy link
Collaborator

fmulero commented Sep 6, 2024

Hi @tbotnz, I've just created the PR #29274 with the changes I mentioned. Sorry for being so picky but I prefer having those changes instead of these to avoid changing the behaviour in a short period of time mainly when the same value (networkPolicy.ingressNSPodMatchLabels) will be treated in different ways.

@tbotnz tbotnz closed this Sep 6, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kafka solved verify Execute verification workflow for these changes
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants