Skip to content

Conversation

juzhao
Copy link
Contributor

@juzhao juzhao commented Aug 15, 2025

task: https://issues.redhat.com/browse/MON-4297
this PR added

  1. default-deny-networkpolicy for all traffic, file: default-deny-networkpolicy.yaml
  2. cluster-monitoring-operator networkpolicy, file: cluster-monitoring-operator-networkpolicy.yaml
  3. KSM networkpolicy, file: kube-state-metrics-networkpolicy.yaml
  4. metrics-server networkpolicy, file: metrics-server-networkpolicy.yaml
  5. monitoring-plugin networkpolicy, file: monitoring-plugin-networkpolicy.yaml
  6. OSM networkpolicy, file: openshift-state-metrics-networkpolicy.yaml
  7. prometheus-operator networkpolicy, file: prometheus-operator-networkpolicy.yaml
  8. prometheus-operator-admission-webhook networkpolicy, file: prometheus-operator-admission-webhook-networkpolicy.yaml
  9. telemeter-client networkpolicy, file: telemeter-client-networkpolicy.yaml

@openshift-ci openshift-ci bot added the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label Aug 15, 2025
@openshift-ci openshift-ci bot requested review from machine424 and marioferh August 15, 2025 08:56
Copy link
Contributor

openshift-ci bot commented Aug 15, 2025

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: juzhao
Once this PR has been reviewed and has the lgtm label, please assign slashpai for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@juzhao
Copy link
Contributor Author

juzhao commented Aug 15, 2025

/retitle [wip] MON-4297 add networkpolicy for CMO/KSM/metrics-server/monitoring-plugin/OSM/prometheus-operator/telemeter-client

@openshift-ci openshift-ci bot changed the title [wip]add networkpolicy for CMO/KSM/metrics-server/monitoring-plugin/OSM/prometheus-operator/telemeter-client [wip] MON-4297 add networkpolicy for CMO/KSM/metrics-server/monitoring-plugin/OSM/prometheus-operator/telemeter-client Aug 15, 2025
@juzhao
Copy link
Contributor Author

juzhao commented Aug 15, 2025

/retest-required

@juzhao
Copy link
Contributor Author

juzhao commented Aug 18, 2025

/retest

@juzhao
Copy link
Contributor Author

juzhao commented Aug 18, 2025

/test verify
/test e2e-aws-ovn

@jan--f
Copy link
Contributor

jan--f commented Aug 19, 2025

/retest

@jan--f
Copy link
Contributor

jan--f commented Aug 19, 2025

We need a policy for the different Prometheus' too don't we? What if a user configures remote write?

Copy link
Contributor

openshift-ci bot commented Aug 19, 2025

@juzhao: The following tests failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/okd-scos-e2e-aws-ovn 02eb990 link false /test okd-scos-e2e-aws-ovn
ci/prow/generate 02eb990 link true /test generate
ci/prow/e2e-hypershift-conformance 02eb990 link true /test e2e-hypershift-conformance
ci/prow/verify 02eb990 link true /test verify
ci/prow/e2e-aws-ovn 02eb990 link true /test e2e-aws-ovn

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@juzhao
Copy link
Contributor Author

juzhao commented Aug 20, 2025

We need a policy for the different Prometheus' too don't we? What if a user configures remote write?

this PR does not include networkpolicy for Prometheus(will do in another PR), and I think

  egress:
  - {}

is enough for prometheus egress, since the remote write address is not a static ip, and above setting allows any ip/port and will use less cpu/memory

@jan--f
Copy link
Contributor

jan--f commented Aug 25, 2025

We need a policy for the different Prometheus' too don't we? What if a user configures remote write?

this PR does not include networkpolicy for Prometheus(will do in another PR), and I think

  egress:
  - {}

is enough for prometheus egress, since the remote write address is not a static ip, and above setting allows any ip/port and will use less cpu/memory

Gotcha, thanks. We'll still need to generate the policies to get the generate target to pass.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants