-
Notifications
You must be signed in to change notification settings - Fork 45
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Admission control webhook check in the "basic" group #92
Comments
Hey @adamwg , I want to do this. |
@dlemel8 Absolutely! You can start by taking a look at the I think there are at least two other checks that could be implemented in the
If those conditions are broken out into their own checks, they could be added to the |
@adamwg great, thanks! |
@adamwg just to make sure I understand correctly (regarding to
|
@dlemel8 Sorry for the delay getting back to you on this. I think for the new check(s) in the basic group. we want to omit some of the existing conditions. The checks I'm proposing are based on the upstream guidance around webhook configurations, so they should be quite strict and would generate warnings for some configurations that are currently considered OK. |
@adamwg OK, that's answer my question about the new checks on basic group. |
We currently have a variety of webhook checks in the
doks
group, since various webhook configurations can be problematic for DOKS upgrades. However, there are also some generic best practices around admission control webhooks, documented in the upstream docs. For example, it's a generic best practice to set timeouts to small values (definitely less than 30 seconds, since that's the default apiserver request timeout).We should build some generic webhook best practice checks that can be included in the
basic
group as well as thedoks
group.The text was updated successfully, but these errors were encountered: