Kyverno support & policy exceptions #238
akyriako
announced in
Announcements
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Heads-up for anyone running Kyverno alongside the Typesense Kubernetes Operator (TyKO).
Kyverno is not and will not be supported for mutating or validating operator-managed resources (StatefulSets, Pods, Services, etc.) created by TyKO.
Why?
The operator shall remain the sole reconciler of the resources it creates and owns. Kyverno
mutaterules on the other hand, act as a "secondary controller" and can cause reconciliation loops, drift, or unexpected rollouts. Evenvalidaterules can block reconciliation in ways the operator can’t reason about. This has already shown up as repeated updates, pod restarts, and unstable clusters in real setups.Because of this, running Kyverno against operator-owned objects is undefined behavior and not something we can reliably or willingfully support.
Required Actions
If you use Kyverno, you must exclude operator-managed resources using the standard label introduced for every operator-managed resource as of the upcoming pre-release
0.3.8-rc.4:app.kubernetes.io/managed-by=typesense-operatorThen use this label within a
PolicyException, which is the cleanest Kyverno-native way to carve out workloads:This will keep Kyverno from acting as a competing controller and avoid configuration drifts.
Beta Was this translation helpful? Give feedback.
All reactions