You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The BinderHub helm chart creates a network policy that restricts egress to running pods, etc. However, when deploying on an Azure k8s cluster, this network policy is not enabled - see discussion in jupyterhub/mybinder.org-deploy#1154 where this bug was discovered for the Turing-Binder Federation cluster.
Expected behaviour
The egress of running pods is restricted.
Additional context
According to this Azure documentation, a network policy cannot be applied to an existing cluster. This means Hub23 would have to be entirely torn down, the YAML config for the network policy found and isolated, and then the cluster redeployed with a network policy enabled.
I've notified Tania of this problem - hopefully she can find some info out from the MSFT k8s team.
The text was updated successfully, but these errors were encountered:
Describe the bug
The BinderHub helm chart creates a network policy that restricts egress to running pods, etc. However, when deploying on an Azure k8s cluster, this network policy is not enabled - see discussion in jupyterhub/mybinder.org-deploy#1154 where this bug was discovered for the Turing-Binder Federation cluster.
Expected behaviour
The egress of running pods is restricted.
Additional context
According to this Azure documentation, a network policy cannot be applied to an existing cluster. This means Hub23 would have to be entirely torn down, the YAML config for the network policy found and isolated, and then the cluster redeployed with a network policy enabled.
I've notified Tania of this problem - hopefully she can find some info out from the MSFT k8s team.
The text was updated successfully, but these errors were encountered: