-
Notifications
You must be signed in to change notification settings - Fork 123
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support checking the kubectl.kubernetes.io/last-applied-configuration annotation #92
Comments
@IronHalo Thanks for the feedback. We have discussed this possibility internally in the past, and have decided that we would rather not implement this. Since it would be limited in scope (only kubectl apply), and it would require scanning every single resource in the cluster, it would be high cost for little benefit. I would really hope that EKS and GKE don't allow upgrading to a k8s version that would render their deployments obsolete without first updating their deployments. This seems to be in the hands of the cloud provider, and not something the typical operator would need or want to monitor. |
Agreed, I'd expect AWS would handle this. A second use case could be developers that have applied things outside of a pipeline. This should never happen, but depending on how locked down an environment it may. Spinnaker also applies manifests generated by My goal is to use a single tool to check compliance of a cluster prior to an upgrade with API removals. |
At least in the case of EKS, they don't manage Additionally, we did some |
The |
@pkoraca that is really good information to have and also extremely disappointing |
Sorry, I just found out it's actually not |
Some k8s manifests are applied by the cloud provider and will be missed by
detect-files
anddetect-helm
. A good example is how EKS handlesCoreDNS
andkubeproxy
; they seem to be applied viakubectl apply
. It would be awesome if pluto could check for this use case.The text was updated successfully, but these errors were encountered: