Replies: 1 comment 9 replies
-
Note #759 removes the 'extension past creation of the CR part', but still one would have some disruption when adding the CRD to the cluster. |
Beta Was this translation helpful? Give feedback.
9 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Today, when applying a Policy CRD to a cluster, it takes effect immediately and prohibits all of the policy-enforceable features, until a Policy CR is created and policy is allowed to whatever it specifies.
This will cause disruption to an existing site, which may extend past the creation of the CR, given that some of the skupper items will be removed when policy does not allow them (skupper services, for example), and the admin will have to recreate them.
The suggestion is to make the Skupper Policy engine work in a similar fashion to how Kubernetes Network Policies work. There, policies are only enforced on a namespace once at least one policy applies to that namespace, otherwise all traffic is allowed.
The difference here on skupper is that the policies should be enforcing or permissive cluster-wide, instead of namespace-wide. This would simplify applying policies for the first time:
Beta Was this translation helpful? Give feedback.
All reactions