-
Notifications
You must be signed in to change notification settings - Fork 271
Missing permission in the managed podSecurityPolicy to authorize the pod to bind port 9092 in hostNetwork mode #365
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
How did you install NTH? I've just tried reproducing this on a cluster of mine and haven't had any errors. If you edit the pod security policy and add the following is there any difference?
If that fixes your issue we can change the yaml template |
👋 hey @haugenj, absolutely this is exactly what I did and it sorts the issue out 👍 I can submit a PR with the change if you want me to, I just did not take the time to do it sorry about that! 😅 |
Yeah if you could write it that'd be awesome! If you can use Mustache to dynamically get the value of the Prometheus port and only include it if Prometheus is enabled I think that would be best. Thanks! |
When metric/prometheus endpoint is enabled, we currently have an issue as the PodSecurityPolicy does not allow the pod to bind the ports. This change sorts this issue out (aws#365).
When metric/prometheus endpoint is enabled, we currently have an issue as the PodSecurityPolicy does not allow the pod to bind the ports. This change sorts this issue out (aws#365). Signed-off-by: Maxime VISONNEAU <[email protected]>
When metric/prometheus endpoint is enabled, we currently have an issue as the PodSecurityPolicy does not allow the pod to bind the ports. This change sorts this issue out (#365). Signed-off-by: Maxime VISONNEAU <[email protected]>
When metric/prometheus endpoint is enabled, we currently have an issue as the PodSecurityPolicy does not allow the pod to bind the ports. This change sorts this issue out (aws#365). Signed-off-by: Maxime VISONNEAU <[email protected]>
When attempting to use
enablePrometheusServer: true
in conjunction withrbac.pspEnabled: true
anduseHostNetwork: true
. It looks like there is some missing parameter in the PodSecurityPolicy to authorize the pod to bindTCP/9092
.The text was updated successfully, but these errors were encountered: