-
### Component(s)
collector
### Is your feature request related to a problem? Please describe.
With the `in-memory` storage solution for `Jaeger` being in place ([extension service](https://gi…
-
Objective:
- To validate the enforcement of ingress and egress network policies for pods in the Kubernetes environment.
Preconditions:
- NebulOuS core is running.
- Kubernetes cluster with netwo…
-
Objective:
- To ensure that network isolation and security policies are correctly applied to applications deployed through NebulOuS.
Preconditions:
- NebulOuS core is running.
- A NebulOuS cloud…
-
**What happened**:
Meeting notes from 27th Feb 2024:
RE: policies and services : In Network Policies
`Cluster ingress and egress mechanisms often require rewriting the source or destination IP of…
-
#### Details of the scenario you tried and the problem that is occurring
When deploying a resource in a Corporate-Connected landing zone, standard practice is to configure `publicNetworkAccess=Disabl…
-
Hello everyone, I was working on deploying a Huly.io instance locally using docker and Treafik. I am only using http as I am running this in my home network. I am getting as far as 10% deployment on t…
-
### Description
I have several smb shares connected in explorer (pushed & named via group policy settings). These shares do show in in Files, but neither have a drive letter nor the name previously c…
-
**Describe the bug**
The initiative Deny-PublicPaaSEndpoints seems to currently have two overlapping policies for Container Apps.
It is:
Container Apps environment should disable public net…
-
### Check for previous/existing GitHub issues
- [x] I have checked for previous/existing GitHub issues
### Issue Type?
Feature Request
### Module Name
avm/res/network/private-dns-zone
### (Optio…
-
### Describe the bug
When im doing deployment code DFW rules are created without problems. But when im doing "terraform plan" or terraform apply 2nd time... somehow terraform recognize some extern…