Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow extra egress rules for the keda operator ciliumnetworkpolicy #610

Merged
merged 1 commit into from
Feb 23, 2024

Conversation

QuentinBisson
Copy link
Contributor

This PR adds support to be able to add extra egress rules to the ciliumnetworkpolicy if for instance, the prometheus used to scale is outside the cluster as the current ciliumnetworkpolicy only allows egress to the cluster pods and the api-server

Checklist

  • I have verified that my change is according to the deprecations & breaking changes policy
  • Commits are signed with Developer Certificate of Origin (DCO - learn more)
  • README is updated with new configuration values (if applicable) learn more
  • A PR is opened to update KEDA core (repo) (if applicable, ie. when deployment manifests are modified)

@QuentinBisson QuentinBisson requested a review from a team as a code owner February 22, 2024 10:35
@QuentinBisson QuentinBisson force-pushed the add-extra-egress-to-cnps branch from 0051078 to 486bfc9 Compare February 22, 2024 10:35
Signed-off-by: QuentinBisson <quentin@giantswarm.io>
@QuentinBisson QuentinBisson force-pushed the add-extra-egress-to-cnps branch from 486bfc9 to 5a53410 Compare February 22, 2024 14:42
@JorTurFer
Copy link
Member

Thanks for the improvement!

@JorTurFer JorTurFer merged commit 62e6320 into kedacore:main Feb 23, 2024
37 checks passed
QuentinBisson added a commit to giantswarm/keda-upstream that referenced this pull request Jul 1, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants