-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
NYS2AWS-43 refine controls on netpols & cilium netpols #164
Conversation
I do not understand the need for this. Is there a specific need to have cilium network policies disabled when the cni=cilium? or to have them enabled when cni=aws? |
We can run it as is, but I think we're setting ourselves up for failure in the future. |
I think the At this point, it only affects if there are cilium network policies enabled or not, and that setting can better be moved to a more explicit The choice of CNI itself should not really affect any other part of the software, only the existence of cilium network policies. |
@@ -189,13 +189,22 @@ nginx rules to redirect the normal pages to a 503 maintenance page. | |||
* Default: true | |||
* Description: A field to enabled/disable network policies. | |||
|
|||
#### `general.networkPolicies.cilium.enabled` |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
how is this different from general.networkPolicies.enabled
if cni is cilium?
I think this is only disabling the Cilium specific ones? Why would you use cilium as general.cni
and disable the cilium policies?
cilium netpolls were tied to a 'cni' variable, which was not correct, given that cilium can be chained to other cnis (as is the case for aws)