[08:31:42] FYI I've started to work on a way to get alerted when un-applied admin_ng changes are pending https://gerrit.wikimedia.org/r/c/operations/puppet/+/1040992 [09:08:58] btullis: are you planning to work on datahub for T359423, T362978, T346638 anythime "soon"? It will become a blocker at the point where it's the last chart not being updated [09:09:58] jayme: Yes. Will do. [09:10:07] Do we have a guide some guide somewhere on how to plumb secretes from the private repo throught the deployment server so that they become visible as env vars to a service? I tried following along the path of AWS_SECRET_ACCESS_KEY but it seems very kserve-specific and that chart is not exactly easy to understand. [09:10:10] cool! <3 [09:10:43] klausman: https://wikitech.wikimedia.org/wiki/Kubernetes/Add_a_new_service#Add_private_data/secrets_(optional) [09:11:01] oh! how did I not find that.... thanks a ton! [09:13:37] btullis: If you're busy, i can take these datahub changes off your hands [09:22:54] brouberol1: Oh thanks so much, yes that would be great. [09:36:11] np, on it [09:37:49] https://gerrit.wikimedia.org/r/c/operations/deployment-charts/+/1041036 [10:00:50] jayme: do we need to have the securityContext stanza on every pod, even the ones created by Job and CronJob resources? [10:01:06] yes [10:01:26] on every container [10:01:29] ack, thanks [11:40:07] jayme: all datahub releases have been redeployed with the container securityContext block [11:40:26] brouberol: ah, great! Thanks a ton [11:41:11] my pleasure. I'll work on similar updates for all our apps: superset and spark-history [11:41:31] sweet [13:49:56] every DPE app on dse-k8s-eqiad now run with a restricted security context [13:52:19] ah actually, no, I missed 2. [14:19:41] *this time* we're all done [14:46:23] eheh [14:46:34] nice! [14:54:31] brouberol: you can validate your statement via the audit log https://logstash.wikimedia.org/goto/a1ee78695b87ffdc262d63bbc34879c8 [14:55:35] create pod actions will trigger an audit log with annotations.pod-security.kubernetes.io/audit-violations annotatioin set, if it would fail validation [14:55:40] (if enforced) [14:57:35] ofc. stuff will only be logged on new container creations [15:00:26] beautiful. I'll keep an eye on it