You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Originally posted by janosmiko January 9, 2025
To enable Kubernetes API server audit logs (or Pod Security Admission configuration), you'll need to add a policy file to the servers. Source
I know it's possible to add files to the servers using cloud init (cloudinit_write_files_common), but I assume this would only work for new servers and not already existing ones.
What would be the best practice to copy various files to all nodes (even existing ones)?
Also, did I understand correctly, currently it's not possible to override the kube_apiserver_args because of this line?
Discussed in #1610
Originally posted by janosmiko January 9, 2025
To enable Kubernetes API server audit logs (or Pod Security Admission configuration), you'll need to add a policy file to the servers. Source
/var/lib/rancher/k3s/server/audit.yaml
And pass some args to the kube-api-server:
I know it's possible to add files to the servers using cloud init (
cloudinit_write_files_common
), but I assume this would only work for new servers and not already existing ones.What would be the best practice to copy various files to all nodes (even existing ones)?
Also, did I understand correctly, currently it's not possible to override the kube_apiserver_args because of this line?
terraform-hcloud-kube-hetzner/locals.tf
Line 437 in 163d50c
I'm open to prepare a PR to solve this, just wanted to do some in-advance discovery on how it should be implemented.
The text was updated successfully, but these errors were encountered: