Add Open Policy Agent (OPA) to Kubernetes cluster #1
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Description
Submission
terraform plan
: https://gist.github.com/mitchellhuang/30f9d4f3a66914686beec94fb9a22420Notes
terraform plan
when specifyingkubernetes_namespace
so I have submitted myterraform plan
withoutnamespace.tf
Update 2020-07-14
I've identified two critical issues with my PR:
I did not implement the last step of the OPA admission controller documentation: the ValidatingWebhookConfiguration CRD. I have solved this by actually adding this step to the pull request (ha): 5c21bf9 09453ea
OPA was sharing the same CA with the Tectonic control panel. Because of how OPA works, I assume we either want to create an independent CA for OPA or use a user provided CA for OPA. I have gone ahead and added those variables to
config.tf
, and if they are not supplied, they will be auto-generated, similar totls/kube/self-signed
: 3bf71b8