Replies: 2 comments 1 reply
-
|
Unless I am missing something, there is no such annotation in Strimzi to avoid the NetworkPolicy generation. |
Beta Was this translation helpful? Give feedback.
0 replies
-
|
Sorry for that, it works now! I can't remember anymore, but it was a Blog post. Thanks a lot for the prompt clarification! |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Bug Description
We are running Strimzi 0.50.0 on AKS with Kyverno enforcing egress rules. Our Kafka custom resource includes the annotation:
metadata: annotations: strimzi.io/network-policy: "none"Despite this, Strimzi continues to attempt to create the strimzi-kafka-network-policy-kafka NetworkPolicy, which is blocked by Kyverno (audit mode is not respected, webhook blocks on missing to field in egress). The Kafka CR remains in a NotReady state with the following status message:
resource NetworkPolicy/kaf-strimzi-cluster-service/strimzi-kafka-network-policy-kafka was blocked due to the following policies check-netpol-open-egress: block-missing-to-in-egress: 'validation error: Egress rules must include at least one ''to'' field (this includes that it can not be {}. rule block-missing-to-in-egress failed at path /spec/egress/'The annotation is present in both the manifest and the live resource.
There is no existing NetworkPolicy in the namespace.
Restarting the Strimzi operator and Kyverno controllers does not resolve the issue.
All Kyverno and Gatekeeper policies are set to audit or dryrun.
No Azure Policy with Deny effect is assigned.
Steps to reproduce
Expected behavior
With the annotation set, Strimzi should not attempt to create any NetworkPolicy for the Kafka resource.
Strimzi version
0.50.0
Kubernetes version
1.33.5
Installation method
We are deploying the Strimzi operator using the official Helm chart (version 0.50.0), managed via kustomize and ArgoCD. Strimzi CRDs and Kafka resources are applied using kustomize.
Infrastructure
Kubernetes: AKS
Configuration files and logs
strimzi-report-sanitized.zip
Additional context
Kyverno: audit mode, but webhook blocks on missing to field
No duplicate Kafka CRs or old manifests.
No other admission controllers enforcing egress found.
Beta Was this translation helpful? Give feedback.
All reactions