-
### Proposal
KEDA should attach corresponding CRD permissions to the built-in `view`, `edit`, and `admin` ClusterRoles through [ClusterRole aggregation](https://kubernetes.io/docs/reference/access-au…
-
### What is the issue?
I am following your k8s tutorial here https://github.com/tailscale/tailscale/blob/main/docs/k8s/README.md for k8s subnet router deployment.
we notice a problem that seems …
-
Hi @amr-mokhtar
Smart-City-Application has been installed successfully on Network Edge OpenNESS 20.06 using below links as a reference.
https://www.openness.org/docs/doc/applications-onboard/ne…
-
### Feature Request
I like the idea of using HashiCorp Vault Secret Source as a secret source for credentials creation and managing secrets in JCasC configuration using helm on k8s.
At the moment …
-
#### Describe the bug
Currently the way to provide things like passwords is via charm configuration. Juju 3.3 and beyond has implemented support for User Secrets, that allows you to supply content …
-
**What steps did you take and what happened:**
Deploy a HelmChartProxy and then change the namespace value. The install gets deleted from the current namespace, but it doesn't get reinstalled to the…
dtzar updated
2 months ago
-
**Is your feature request related to a problem?**
Currently our EKS upgrade strategy is blue/green where we provision a new cluster and migrate workloads over to the new cluster. For most application…
-
Is it possible to integrate weaver with cloud-native tools ( like argocd , external DNS, sealed secrets ..... etc ) ?
for example:
- consider a scenario where we need to add an annotation to a k8s…
-
Daniel, not sure Kubernetes is an option in your current $work, I am submitting this issue simply for ideas.
The current apprunner solves CICD problems to a virtual machine. However, most enterpr…
-
## Cilium Feature Proposal
**Is your proposed feature related to a problem?**
For this example I will use AWS and Amazon EKS naming conventions. Similar concepts might apply to other cloud vendo…