Skip to content

Conversation

@Eliastisys
Copy link
Contributor

@Eliastisys Eliastisys commented Nov 28, 2025

Warning

This is a public repository, ensure not to disclose:

  • personal data beyond what is necessary for interacting with this pull request, nor
  • business confidential information, such as customer names.

What kind of PR is this?

Required: Mark one of the following that is applicable:

  • kind/feature
  • kind/improvement
  • kind/deprecation
  • kind/documentation
  • kind/clean-up
  • kind/bug
  • kind/other

Optional: Mark one or more of the following that are applicable:

Important

Breaking changes should be marked kind/admin-change or kind/dev-change depending on type
Critical security fixes should be marked with kind/security

  • kind/admin-change
  • kind/dev-change
  • kind/security
  • [kind/adr](set-me)

What does this PR do / why do we need this PR?

...

  • Fixes #

Information to reviewers

Fixes psps and netpols for the pods included in the velero snapshot machinery. Something changed along the line in how they work and since we don't have a test scenario that does a snapshot, we managed to miss it. Will add more tests to cover this.

Checklist

  • Proper commit message prefix on all commits
  • Change checks:
    • The change is transparent
    • The change is disruptive
    • The change requires no migration steps
    • The change requires migration steps
    • The change updates CRDs
    • The change updates the config and the schema
  • Documentation checks:
  • Metrics checks:
    • The metrics are still exposed and present in Grafana after the change
    • The metrics names didn't change (Grafana dashboards and Prometheus alerts required no updates)
    • The metrics names did change (Grafana dashboards and Prometheus alerts required an update)
  • Logs checks:
    • The logs do not show any errors after the change
  • PodSecurityPolicy checks:
    • Any changed Pod is covered by Kubernetes Pod Security Standards
    • Any changed Pod is covered by Gatekeeper Pod Security Policies
    • The change does not cause any Pods to be blocked by Pod Security Standards or Policies
  • NetworkPolicy checks:
    • Any changed Pod is covered by Network Policies
    • The change does not cause any dropped packets in the NetworkPolicy Dashboard
  • Audit checks:
    • The change does not cause any unnecessary Kubernetes audit events
    • The change requires changes to Kubernetes audit policy
  • Falco checks:
    • The change does not cause any alerts to be generated by Falco
  • Bug checks:
    • The bug fix is covered by regression tests

@viktor-f
Copy link
Contributor

viktor-f commented Dec 5, 2025

Tested on evroc and it worked there 🚀

@Eliastisys Eliastisys marked this pull request as ready for review December 9, 2025 08:07
@Eliastisys Eliastisys requested review from a team as code owners December 9, 2025 08:07
@Eliastisys Eliastisys changed the title apps wc: fix velero snapshots apps: fix velero snapshots Dec 9, 2025
@Eliastisys Eliastisys requested a review from viktor-f December 9, 2025 08:30
@Eliastisys Eliastisys merged commit ebe1d02 into main Dec 10, 2025
13 checks passed
@Eliastisys Eliastisys deleted the eliash/velero-snapshots branch December 10, 2025 08:55
@simonklb
Copy link
Contributor

Will add more tests to cover this.

Keeping you to that promise! 😄

@rarescosma rarescosma mentioned this pull request Dec 11, 2025
35 tasks
AlbinB97 pushed a commit that referenced this pull request Dec 17, 2025
AlbinB97 pushed a commit that referenced this pull request Dec 17, 2025
rarescosma pushed a commit that referenced this pull request Dec 19, 2025
rarescosma pushed a commit that referenced this pull request Dec 19, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants