Uploaded image for project: 'HPCC'
  1. HPCC
  2. HPCC-26616

Networkpolicies in hpcc namespace appear to be blocking access to eclwatch

    XMLWordPrintable

Details

    • Bug
    • Status: Resolved
    • Not specified
    • Resolution: Fixed
    • 8.2.22
    • 8.4.0
    • cloud
    • None

    Description

      We are attempting to bring up an HPCC cluster using the terraform module on 8.2.22. After applying it we cannot access eclwatch until we delete all of the network policies under the hpcc namespace. 

       

      Here are the list of policies after applying it:

      $ kubectl get networkpolicies -A
      NAMESPACE NAME POD-SELECTOR AGE
      hpcc allow-apiserver <none> 4m31s
      hpcc dali-server app=dali 4m31s
      hpcc default-deny-all-but-dns <none> 4m31s
      hpcc esp-client accessEsp=yes 4m31s
      hpcc esp-server app=eclservices 4m31s
      hpcc roxie roxie-cluster=roxie 4m31s

       

      It doesn't appear to matter the order in which they are deleted, once the last network policy is removed, only then can I reach the eclwatch page.

       

      Attachments

        Activity

          People

            richardkchapman Richard Chapman
            rwagner42 Russell Wagner
            Votes:
            0 Vote for this issue
            Watchers:
            10 Start watching this issue

            Dates

              Created:
              Updated:
              Resolved: