-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
analysis with specific ingress controllers #281
base: main
Are you sure you want to change the base?
Conversation
hi @adisos, at this first commit in this PR, I've added a test directory with an example that should be resolved for issue #235
with our current analysis , ingress connection to the
|
(1) A connectivity line should specify a specific ingress-controller if possible |
hi @adisos ,
|
…_235_better_support_ingress_analysis
in the last commit added support for some labels of the |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
added a few comments
// adding the ingress controller pod to the policy engine, | ||
ingressControllerPod, err := pe.AddPodByNameAndNamespace(common.IngressPodName, common.IngressPodNamespace) | ||
// adding specific known controller pods to the policy engine | ||
specificIngressControllers, err := addSpecificIngressControllers(pe) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
what if such pods already exist in the input resources list?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
if such pod already exists but no Route/Ingress found - nothing need to be done (handled in the past).
if we have Ingress/Route , till now assumed there is no ingress-controller deployment, in the resources.
but if such resources exist :
how should it behave?
option 1 : act as the existing ingress pod/s are the only ones considered for ingress analysis? (don't add fake
ingress pods from other namespaces)
but then if (for-example) we have an nginx-ingress
deployment in the resources.
and a policy-rule with namespaceSelector
selecting one of the openshift
controller namespaces - this rule will be ignored for ingress-analysis (as any rule which select a not existing namespace/pod)
option2 : add fake ingress pods for the other ingress-controllers ?
if this option is the desired :
- if all ingress-controllers are supported should still have the general output line with {ingress-controller}
as source ? (without the existing pod line)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
another q: should we assume only one ingress-controller deployment may exist in the resources?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think it makes sense to assume only the input ingress controller if there is such, and then avoid adding the fake ingress pods.
test_outputs/cli/acs-security-demos_focus_workload_ingress-controller_connlist_output.txt
Outdated
Show resolved
Hide resolved
Co-authored-by: Adi Sosnovich <[email protected]>
Co-authored-by: Adi Sosnovich <[email protected]>
…_235_better_support_ingress_analysis
issue #235