Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add whitelist to examples #82

Merged
merged 5 commits into from
Jul 18, 2018
Merged

Add whitelist to examples #82

merged 5 commits into from
Jul 18, 2018

Conversation

Aergonus
Copy link
Collaborator

@Aergonus Aergonus commented Jul 9, 2018

As per #78, this will help people who want to come in and deploy quickly. I think when I made the PR to add whitelists we discussed the default whitelist behavior and decided to err on the safe side and whitelist only the default namespace rather than not have a whitelist.

@asobti
Copy link
Owner

asobti commented Jul 9, 2018

Taking a step back, what's the purpose of the whitelist in the first place? By adding the kube-monkey labels to their app, they are effectively whitelisting that app. Why the need to further add that namespace to this whitelist?

@asobti
Copy link
Owner

asobti commented Jul 9, 2018

One of the advantages of enabling apps for kube-monkey by adding labels to them was to allow apps to be enrolled/un-enrolled without having to reconfigure and restart kube-monkey, since kube-monkey forgets its current schedule everytime it gets restarted.

@Aergonus
Copy link
Collaborator Author

Aergonus commented Jul 9, 2018 via email

@asobti
Copy link
Owner

asobti commented Jul 9, 2018

People wanted a opt in whitelist

I always understood that as a request for the ability to automatically have all apps within the whitelisted namespaces be potential victims for kube-monkey, without the need to add the kube-monkey labels to each app.

In your scenario, where they have the same app running in multiple namespaces (dev, staging, live etc.), why not just add the kube-monkey labels only in the namespaces you want kube-monkey to run in?

for eg:

app: web-frontend
namespace: dev
labels:
  kube-monkey/enabled: enabled
  ...
app: frontend
namespace: prod
labels:
  kube-monkey/enabled: disabled

@Aergonus
Copy link
Collaborator Author

True, with opt-in it's kind of redundant. Making the whitelist default all namespaces and tracking the whitelist opt-out in #5 makes sense to me. The option can stay as a no-op feature or if someone needs to convince their management that it definitely won't affect other namespaces.

@Aergonus Aergonus force-pushed the whitelist-default branch from 5eb5246 to 2c1e248 Compare July 12, 2018 14:36
Aergonus added 2 commits July 12, 2018 10:43
Hide feature until stable
This reverts commit 6f507ec.
@Aergonus Aergonus force-pushed the whitelist-default branch from 2c1e248 to 1c88583 Compare July 12, 2018 14:43
@asobti
Copy link
Owner

asobti commented Jul 12, 2018

Thanks. Could you also remove line 14

https://github.com/asobti/kube-monkey/blob/master/examples/configmap.yaml#L14

no-op hide by default until whitelist is opt-out
@Aergonus
Copy link
Collaborator Author

Good catch, do you prefer to remove it from the README as well until it works as opt in? That's the last public trace of it.

@asobti asobti merged commit 5ab2a24 into master Jul 18, 2018
@asobti asobti deleted the whitelist-default branch July 18, 2018 18:37
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants