You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
error: ingresses.networking.k8s.io "handbook" could not be patched: admission webhook "validation.gatekeeper.sh" denied the request: [azurepolicy-k8sazurev1ingresshttpsonly-51db6f58fe78f0936166] Ingress should allow https only. tls configuration and annotation nginx.ingress.kubernetes.io/force-ssl-redirect=true are required for handbook
Suggested solution to the issue
The policy code should check whether it contains the nginx.org/mergeable-ingress-type annotation. If it is a minion, the the policy should not block the resource deployment.
The text was updated successfully, but these errors were encountered:
Details of the scenario you tried and the problem that is occurring
False positive on policy "Kubernetes clusters should be accessible only over HTTPS" for Nginx mergable ingress resources. The mergeable ingress resource has master type with spec.tls configuration and minion type without spec.tls.
Detailed spec for mergeable ingress types. https://github.com/nginx/kubernetes-ingress/tree/v3.3.2/examples/ingress-resources/mergeable-ingress-types
Verbose logs showing the problem
error: ingresses.networking.k8s.io "handbook" could not be patched: admission webhook "validation.gatekeeper.sh" denied the request: [azurepolicy-k8sazurev1ingresshttpsonly-51db6f58fe78f0936166] Ingress should allow https only. tls configuration and annotation nginx.ingress.kubernetes.io/force-ssl-redirect=true are required for handbook
Suggested solution to the issue
The policy code should check whether it contains the nginx.org/mergeable-ingress-type annotation. If it is a minion, the the policy should not block the resource deployment.
The text was updated successfully, but these errors were encountered: