UNCLASSIFIED - NO CUI

Completed bb-common Integration

General MR

Summary

  • Updated gluon from 0.9.7 to 1.0.1
  • Updated bb-common to 0.9.1 to 0.14.2
  • Removed static resources and replaced with bb-common generated resources

Relevant logs/screenshots

Before Upgrade (Network Policies were already done):

kubectl get ap -n mimir

NAME                                      ACTION   AGE
mimir-allow-alloy-authz-policy            ALLOW    23m
mimir-allow-grafana-authz-policy          ALLOW    23m
mimir-allow-minio-authz-policy            ALLOW    23m
mimir-allow-minio-operator-authz-policy   ALLOW    23m
mimir-allow-namespace-authz-policy        ALLOW    23m
mimir-allow-prometheus-authz-policy       ALLOW    23m

kubectl get se -n mimir

NAME                            HOSTS                                                                                                                                                                                                                                                                                       LOCATION        RESOLUTION   AGE
cypress-service-entries-mimir   ["registry.npmjs.org","download.cypress.io","cdn.cypress.io","repo1.dso.mil","grafana.dev.bigbang.mil","optimizationguide-pa.googleapis.com","clientservices.googleapis.com","accounts.google.com","redirector.gvt1.com","content-autofill.googleapis.com","safebrowsing.googleapis.com"]   MESH_EXTERNAL   DNS          23m

kubectl get pa -n mimir

NAME                  MODE     AGE
default-mimir-mimir   STRICT   24m

After Upgrade:

kubectl get netpol -n mimir

NAME                                                                                      POD-SELECTOR                              AGE
allow-egress-from-mimir-to-kubeapi                                                        app.kubernetes.io/name=mimir              36m
allow-egress-from-mimir-to-ns-monitoring-pod-grafana-tcp-port-3000                        app.kubernetes.io/name=mimir              36m
allow-egress-from-minio-to-kubeapi                                                        app.kubernetes.io/name=minio              36m
allow-egress-from-rollout-operator-to-kubeapi                                             app.kubernetes.io/name=rollout-operator   36m
allow-egress-from-rollout-operator-to-ns-monitoring-pod-grafana-tcp-port-3000             app.kubernetes.io/name=rollout-operator   36m
allow-ingress-to-mimir-tcp-port-15020-from-ns-monitoring-pod-prometheus                   app.kubernetes.io/name=mimir              36m
allow-ingress-to-mimir-tcp-ports-8080-9095-from-ns-monitoring-pod-grafana                 app.kubernetes.io/name=mimir              36m
allow-ingress-to-mimir-tcp-ports-8080-9095-from-ns-monitoring-pod-prometheus              app.kubernetes.io/name=mimir              36m
allow-ingress-to-minio-tcp-port-15020-from-ns-monitoring-pod-prometheus                   app.kubernetes.io/name=minio              36m
allow-ingress-to-minio-tcp-port-9000-from-ns-minio-operator-pod-minio-operator            app.kubernetes.io/name=minio              36m
allow-ingress-to-minio-tcp-port-9000-from-ns-monitoring-pod-prometheus                    app.kubernetes.io/name=minio              36m
allow-ingress-to-rollout-operator-tcp-port-15020-from-ns-monitoring-pod-prometheus        app.kubernetes.io/name=rollout-operator   36m
allow-ingress-to-rollout-operator-tcp-ports-8080-9095-from-ns-monitoring-pod-grafana      app.kubernetes.io/name=rollout-operator   36m
allow-ingress-to-rollout-operator-tcp-ports-8080-9095-from-ns-monitoring-pod-prometheus   app.kubernetes.io/name=rollout-operator   36m
default-egress-allow-all-in-ns                                                            <none>                                    36m
default-egress-allow-istiod                                                               <none>                                    36m
default-egress-allow-kube-dns                                                             <none>                                    36m
default-egress-deny-all                                                                   <none>                                    36m
default-ingress-allow-all-in-ns                                                           <none>                                    36m
default-ingress-allow-prometheus-to-istio-sidecar                                         <none>                                    36m
default-ingress-deny-all                                                                  <none>                                    36m

kubectl get ap -n mimir

NAME                                                                                                                           ACTION   AGE
allow-ingress-to-mimir-tcp-port-15020-from-ns-monitoring-with-identity-monitoring-monitoring-kube-prometheus                   ALLOW    101s
allow-ingress-to-mimir-tcp-ports-8080-9095-from-ns-monitoring-with-identity-monitoring-grafana                                 ALLOW    101s
allow-ingress-to-mimir-tcp-ports-8080-9095-from-ns-monitoring-with-identity-monitoring-monitoring-kube-prometheus              ALLOW    101s
allow-ingress-to-minio-tcp-port-15020-from-ns-monitoring-with-identity-minio-operator                                          ALLOW    101s
allow-ingress-to-minio-tcp-port-9000-from-ns-minio-operator-with-identity-minio-operator                                       ALLOW    101s
allow-ingress-to-minio-tcp-port-9000-from-ns-monitoring-with-identity-monitoring-monitoring-kube-prometheus                    ALLOW    101s
allow-ingress-to-rollout-operator-tcp-port-15020-from-ns-monitoring-with-identity-monitoring-monitoring-kube-prometheus        ALLOW    101s
allow-ingress-to-rollout-operator-tcp-ports-8080-9095-from-ns-monitoring-with-identity-monitoring-grafana                      ALLOW    101s
allow-ingress-to-rollout-operator-tcp-ports-8080-9095-from-ns-monitoring-with-identity-monitoring-monitoring-kube-prometheus   ALLOW    101s
default-authz-allow-all-in-ns                                                                                                  ALLOW    101s
default-authz-allow-nothing                                                                                                             101s

kubectl get se -n mimir

NAME                HOSTS               LOCATION        RESOLUTION   AGE
bb-tests-external   ["repo1.dso.mil"]   MESH_EXTERNAL   DNS          109s

kubectl get pa -n mimir

NAME                MODE     AGE
default-peer-auth   STRICT   116s

image

image

image

kubectl get netpol -n mimir (minio-related network policies gone and egress using storage-subnets umbrella policy enabled)

NAME                                                                                      POD-SELECTOR                              AGE
allow-egress-from-mimir-to-kubeapi                                                        app.kubernetes.io/name=mimir              42m
allow-egress-from-mimir-to-ns-monitoring-pod-grafana-tcp-port-3000                        app.kubernetes.io/name=mimir              42m
allow-egress-from-mimir-to-storage-subnets                                                app.kubernetes.io/name=mimir              38s
allow-egress-from-rollout-operator-to-kubeapi                                             app.kubernetes.io/name=rollout-operator   42m
allow-egress-from-rollout-operator-to-ns-monitoring-pod-grafana-tcp-port-3000             app.kubernetes.io/name=rollout-operator   42m
allow-ingress-to-mimir-tcp-port-15020-from-ns-monitoring-pod-prometheus                   app.kubernetes.io/name=mimir              42m
allow-ingress-to-mimir-tcp-ports-8080-9095-from-ns-monitoring-pod-grafana                 app.kubernetes.io/name=mimir              42m
allow-ingress-to-mimir-tcp-ports-8080-9095-from-ns-monitoring-pod-prometheus              app.kubernetes.io/name=mimir              42m
allow-ingress-to-rollout-operator-tcp-port-15020-from-ns-monitoring-pod-prometheus        app.kubernetes.io/name=rollout-operator   42m
allow-ingress-to-rollout-operator-tcp-ports-8080-9095-from-ns-monitoring-pod-grafana      app.kubernetes.io/name=rollout-operator   42m
allow-ingress-to-rollout-operator-tcp-ports-8080-9095-from-ns-monitoring-pod-prometheus   app.kubernetes.io/name=rollout-operator   42m
default-egress-allow-all-in-ns                                                            <none>                                    42m
default-egress-allow-istiod                                                               <none>                                    42m
default-egress-allow-kube-dns                                                             <none>                                    42m
default-egress-deny-all                                                                   <none>                                    42m
default-ingress-allow-all-in-ns                                                           <none>                                    42m
default-ingress-allow-prometheus-to-istio-sidecar                                         <none>                                    42m
default-ingress-deny-all                                                                  <none>                                    42m

kubectl get ap -n mimir (No minio-related authpols present)

NAME                                                                                                                           ACTION   AGE
allow-ingress-to-mimir-tcp-port-15020-from-ns-monitoring-with-identity-monitoring-monitoring-kube-prometheus                   ALLOW    7m15s
allow-ingress-to-mimir-tcp-ports-8080-9095-from-ns-monitoring-with-identity-monitoring-grafana                                 ALLOW    7m15s
allow-ingress-to-mimir-tcp-ports-8080-9095-from-ns-monitoring-with-identity-monitoring-monitoring-kube-prometheus              ALLOW    7m15s
allow-ingress-to-rollout-operator-tcp-port-15020-from-ns-monitoring-with-identity-monitoring-monitoring-kube-prometheus        ALLOW    7m15s
allow-ingress-to-rollout-operator-tcp-ports-8080-9095-from-ns-monitoring-with-identity-monitoring-grafana                      ALLOW    7m15s
allow-ingress-to-rollout-operator-tcp-ports-8080-9095-from-ns-monitoring-with-identity-monitoring-monitoring-kube-prometheus   ALLOW    7m15s
default-authz-allow-all-in-ns                                                                                                  ALLOW    7m15s
default-authz-allow-nothing      

Linked Issue

issue

Upgrade Notices

Mimir is now leveraging our bb-common integration for all network policies and istio-related resources. Please refer to this blog post for additional information on the integration.

Umbrella Branch

mimir-bb-common

Edited by Jimmy Bourque

Merge request reports

Loading