Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[DDO-3475] Attempting to Fix TDR in Bees following upgrade to GKE 1.25 #249

Merged
merged 6 commits into from
Feb 12, 2024

Conversation

mikeflinn
Copy link
Contributor

@mikeflinn mikeflinn commented Feb 12, 2024

The old rbac enabled flag wrapped both both pod security policy associated resources and also tdr's permission to talk to the k8s api. This separates them so that we can disable pod security policy without breaking tdrs ability to talk to k8s.

All bee creations are currently failing because of this.

@mikeflinn mikeflinn requested a review from nmalfroy February 12, 2024 15:26
{{- if .Values.rbac.pspEnabled -}}
=======
{{- if .Values.rbac.create | and .Values.pspEnabled -}}
>>>>>>> 43912b03 (separate values)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

looks like the conflict got merged?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm cleaning it up, thanks!

@choover-broad choover-broad merged commit 73262fb into master Feb 12, 2024
1 check passed
@choover-broad choover-broad deleted the mf-attempt-to-unbreak-bees branch February 12, 2024 15:55
@choover-broad choover-broad changed the title Attempting to Fix TDR in Bees following upgrade to GKE 1.25 [DDO-3475] Attempting to Fix TDR in Bees following upgrade to GKE 1.25 Feb 12, 2024
okotsopoulos added a commit that referenced this pull request Mar 6, 2024
…cies

This is a follow-on to #249 which only made the necessary changes for TDR Bees to be compatible with GKE 1.25.
TDR Bees don't use the gcloud-sqlproxy, and the existing rbac.create flag enabled more than just resources associated with PodSecurityPolicies, so I've added an additional rbac.pspEnabled flag to toggle only those resources without impacting other necessary operations (such as SA creation).

Defaulted this value to true to keep existing behavior the same: we will then disable it for each environment, and likely cut it out altogether once everything is stable.

Bumped the gcloud-sqlproxy chart patch version.
okotsopoulos added a commit that referenced this pull request Mar 6, 2024
…sqlproxy-psp-flag

[PROD-934] TDR gcloud-sqlproxy conditionally disables PodSecurityPolicies

This is a follow-on to #249 which only made the necessary changes for TDR Bees to be compatible with GKE 1.25. TDR Bees don't use the gcloud-sqlproxy, and the existing rbac.create flag enabled more than just resources associated with PodSecurityPolicies, so I've added an additional rbac.pspEnabled flag to toggle only those resources without impacting other necessary operations (such as SA creation).

Defaulted this value to true to keep existing behavior the same.

We will then disable it for each environment starting with Dev in terra-helmfile, and likely cut it out altogether once everything is stable.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants