Arpan Chatterjee
Arpan Chatterjee
To be precise its not actually crossplanes doing rather provider-Kubernetes ,its used to create Kubernetes resources that uses cross plane to do that, so for that it auto injects some...
Crossplane does put labels on the roles injected by it. ![image](https://user-images.githubusercontent.com/9463052/186585681-2a0108e8-ce56-4257-9d25-8c7c36ea8938.png)
This is the repo for crossplane provider-kuberntes: https://github.com/crossplane-contrib/provider-kubernetes just for information
its because of this config on provider : https://github.com/crossplane-contrib/provider-kubernetes/blob/main/examples/provider/config-in-cluster.yaml. i am exactly not sure if i am explaining the problem clearly. my question was if the NS already exists ,with...
same for me its happening in my prod,but I'm not able to replicate this in kind.
i will try your suggestion
yes , @maxsmythe by disabling audit from cache does solve my problem ,i will still keep it on look just to make sure any violation are not getting missed from...
so disabling the cache fixed the issue, but i tried to check some more to validate it. it can be reproduced, with these changes to audit pod. ``` spec: automountServiceAccountToken:...
found some similar behavior on this issue: https://github.com/open-policy-agent/gatekeeper/issues/2307 audit has issues with reporting violations
same type issue and quite problematic: Crossplane version: 1.8.1 provider: provider-kubernetes(its not related to it as i believe) steps: 1. create a new definition(example dockerconfig) 2. create composition based on...