Rhituraj Sen
Rhituraj Sen
k8s platform = AKS, Managed Cluster version of starboard = starboard-operator:0.13.1 installation steps = kubectl Non-Default config - - name: OPERATOR_TARGET_NAMESPACES value: "" resources: requests: memory: 5Gi cpu: 500m limits:...
@danielpacak Not sure why... but this issue I am facing on a specific cluster only The error starts with - E0127 15:37:13.497966 1 reflector.go:138] pkg/mod/k8s.io/[email protected]/tools/cache/reflector.go:167: Failed to watch *v1alpha1.VulnerabilityReport: failed...
This would be good to have a new feature to configure these settings.... In my situation there are 5000+ reports and to get all these api call times out which...
I think you meant to use - ``` publicIPPrefix: reference: group: network.azure.com kind: PublicIPPrefix name: clusterapi-prov-second-cluster-ip-prefix-2 ``` I tried this but looks like here the retry logic is missing again....
@theunrepentantgeek is this bug fixed on v2.9.0 already ?
Even I am looking for the same thing. Otherwise if a azure resource is created with `reconcile-policy` to `manage` by default then an accidental deletion of the resource will delete...
@KhaledEmaraDev @realshuting @syurevich I tried to use your recommendation but it didn't work for me. Here is my config - ``` metricsExposure: kyverno_admission_requests_total: enabled: true kyverno_policy_rule_info_total: enabled: true kyverno_policy_results_total: enabled:...
@syurevich I am using helm chart [v3.1.0](https://artifacthub.io/packages/helm/kyverno/kyverno/3.1.0) having application v1.11.0. As [metricsExposure](https://kyverno.io/docs/monitoring/#configuring-the-metrics) is working as expected for you I am wondering which version you are using ?
@syurevich Not on deleted the Kyverno admission controller pods, I completely removed kyverno and then redeployed it. Still metrics are exported
@syurevich yes the configmap got all the changes reflected ``` metricsExposure: '{"kyverno_admission_requests_total":{"enabled":true},"kyverno_admission_review_duration_seconds":{"enabled":false},"kyverno_client_queries_total":{"enabled":false},"kyverno_controller_drop_total":{"enabled":false},"kyverno_controller_reconcile_total":{"enabled":false},"kyverno_controller_requeue_total":{"enabled":false},"kyverno_http_requests_duration_seconds":{"enabled":false},"kyverno_http_requests_total":{"enabled":true},"kyverno_policy_changes_total":{"enabled":true},"kyverno_policy_execution_duration_seconds":{"enabled":false},"kyverno_policy_results_total":{"enabled":true},"kyverno_policy_rule_info_total":{"enabled":true},"kyverno_ttl_controller_info":{"enabled":false}}'