-
Notifications
You must be signed in to change notification settings - Fork 784
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Dryrun does not show the violations, For Deny it works. #3569
Comments
Actually i have validation check for CREATE and UPDATE operation. Audit does not respect that. |
Audit should work with dryrun against resources on the cluster. After the resource is created, you should see the violating resource in the constraint status with Dryrun enforcementAction after an audit run. More info: https://open-policy-agent.github.io/gatekeeper/website/docs/violations#dry-run-enforcement-action If you continue to see issues, please share repro steps including your ConstraintTemplate, Constraint, and violating resource. |
@ritazh Actually Audit does not show when we have a condition check for operation, when i commented that code dryrun violation shows up.
|
Ah I see, your rego explicitly checks input.review.operation for CREATE and UPDATE.
|
@ritazh thanks a lot, it was a miss on my end did not go through documentation. |
Kubernetes version: v1.29.6-eks-1552ad0
Gatekeeper version: 3.13.4
Example constraint:
The text was updated successfully, but these errors were encountered: