首页
视频
资源
登录
原
精
Kubernetes .Net6 Webhook
5760
人阅读
2022/7/28 10:49
总访问:
2263516
评论:
0
收藏:
0
手机
分类:
容器编排
 >#Kubernetes .Net6 Webhook [TOC] tn2>本文主要是学习陈计节大佬讲的<a href="https://www.bilibili.com/video/BV1EB4y1X7LU?share_source=copy_web&vd_source=8bcb708671d6db603f4ee284e9023642" target="_blank"> 使用 .NET Core 开发 Kubernetes 基础组件</a>记录的笔记。 >### Admission Webhook的介绍 tn2>Admission Webhook 是 api-server 对外提供的一个扩展能力,把K8s中的ApiServer当作我们.net的网站的话,它就像是其中的Filter过滤器一样可以拦截并修改这些请求信息。 >### MutatingAdmissionWebhook 与 ValidatingAdmissionWebhook tn2>我们可以通过MutatingAdmissionWebhook 与 ValidatingAdmissionWebhook控制器进行强制实施自定义的策略。 流程如下图所示:  tn2>MutatingAdmissionWebhook:进行变更处理 ValidatingAdmissionWebhook:负责验证处理 >### 先决条件 tn2>确保启用了`MutatingAdmissionWebhook`和`ValidatingAdmissionWebhook`资源类型,以及`admissionregistration.k8s.io/v1`API。 可通过如下命令进行检查。 ```bash kubectl api-resources | egrep "ValidatingWebhookConfiguration|MutatingWebhookConfiguration" ```  >### 需求分析 tn2>我们想实现如下的一个需求: 1.我们不允许来源于`abcd.com`网站的镜像源进行创建容器。(`ValidatingAdmissionWebhook`) 2.我们对创建Pod`annotations:k8s.jijiechen.com/inject-dotnet-helper: "true"`的进行创建一个边车容器,像dapr、istio注入一样。 >### 创建K8sWebhook项目 tn2>创建一个名为K8sWebhook API项目(添加Docker支持)。 并添加`KubernetesClient.Models`依赖包。  ```xml <PackageReference Include="KubernetesClient.Models" Version="8.0.12" /> ``` tn2>然后我们就需要去找到K8s的OpenAPI了,我提供了如下连接请根据k8s的版本需要对应swagger.json。 ```bash https://github.com/kubernetes/kubernetes/blob/master/api/openapi-spec/swagger.json https://raw.githubusercontent.com/kubernetes/kubernetes/release-1.20/api/openapi-spec/swagger.json ``` tn2>下载下来后,将json文件放入项目中的`AdminReviewModels`目录下。  tn2>然后我们进行添加服务。    tn2>点击完成后,我们需要对生成的类做一些修改,我们找到项目目录的`obj`下找到`admission.swaggerClient.cs`文件。 在该目录下打开一个`bash`窗口,并执行如下命令。 该命令可以将项目中的序列化类从`Newtonsoft.Json`更改为`System.Text.Json`。  ```bash sed -i 's/public RawExtension/public System.Text.Json.JsonElement/g' ./admission.swaggerClient.cs sed -i 's/\[Newtonsoft.Json.JsonProperty/[System.Text.Json.Serialization.JsonPropertyName/g' ./admission.swaggerClient.cs sed -i 's/,\ Required.*/)]/g' ./admission.swaggerClient.cs ``` tn2>更改完成后,我们项目创建算是完成了。 >### 编写MutatingAdmissionWebhook控制器 tn2>创建`WebhookMutate.cs`文件,编写如下代码: ```csharp public static class WebhookMutate { const string InjectAnnotationKeySetting = "k8s.jijiechen.com/inject-dotnet-helper"; public static AdmissionReview InjectDotnetHelper(AdmissionReview reviewRequest) { // 创建通行结果 var allowedResponse = CreateInjectResponse(reviewRequest, true); // 判断请求的资源类型是不是Pod,是不是创建的请求,如果不是直接放行 if (reviewRequest.Request.Kind.Kind != "Pod" || reviewRequest.Request.Operation != "CREATE") { return allowedResponse; } // 序列化成一个Pod资源对象 var podJson = reviewRequest.Request.Object.GetRawText(); Console.WriteLine($"原来的 Pod Json:{podJson}"); var pod = JsonSerializer.Deserialize<V1Pod>(podJson, new JsonSerializerOptions() { PropertyNamingPolicy = JsonNamingPolicy.CamelCase }); Console.WriteLine($"序列化后 Pod Json:{JsonSerializer.Serialize(pod)}"); // 判断是否需要注入 var _DisabledByAnnotation = DisabledByAnnotation(pod!.Metadata.Annotations); Console.WriteLine($"判断是否需要注入 :{!_DisabledByAnnotation}"); if (_DisabledByAnnotation) { return allowedResponse; } // 如果该容器是我们注入的边车容器则跳过直接放行 var _AlreadyInjected = AlreadyInjected(pod); Console.WriteLine($"判断是否已经注入 :{_AlreadyInjected}"); if (_AlreadyInjected) { return allowedResponse; } // 创建我们的边车容器 var container = new V1Container("dotnet-helper") { Args = new[] { "infinity" }, Command = new[] { "sleep" }, Image = "mcr.microsoft.com/dotnet/runtime:6.0", ImagePullPolicy = "IfNotPresent" }; // 获取pod名称 var podName = string.IsNullOrEmpty(reviewRequest.Request.Name) ? pod.Metadata.GenerateName + "?" : reviewRequest.Request.Name; // 获取完整的pod名称 var fullPodName = $"{reviewRequest.Request.Namespace}/{podName}"; Console.WriteLine($"正在向此 Pod 中注入 dotnet helper:{fullPodName}"); // 发起添加的请求 var patch = new { op = "add", path = "/spec/containers/-", value = container }; var patches = new[] { patch }; var patchResponse = new AdmissionResponse() { Allowed = true, PatchType = "JSONPatch", Patch = Encoding.Default.GetBytes(JsonSerializer.Serialize(patches)) }; var reviewResponse = CreateInjectResponse(reviewRequest, true); // 编写请求的结果 reviewResponse.Response = patchResponse; Console.WriteLine($"获取请求结果 :{JsonSerializer.Serialize(patchResponse)}"); return reviewResponse; } private static bool AlreadyInjected(V1Pod pod) { return pod.Spec.Containers.Any(c => c.Name == "dotnet-helper"); } /// <summary> /// 判断是否需要注入 /// /// annotation: k8s.jijiechen.com/inject-dotnet-helper:true 可以通过 /// annotation: k8s.jijiechen.com/inject-dotnet-helper:false 不可以通过 /// </summary> /// <param name="annotations"></param> /// <returns></returns> private static bool DisabledByAnnotation(IDictionary<string, string>? annotations) { // 当创建时没有annotations我们便不进行注入 if (annotations == null) { return true; } var falseValues = new[] { "no", "false", "0" }; // 判断为false我们也不进行注入 return annotations.TryGetValue(InjectAnnotationKeySetting, out var annotation) && falseValues.Contains(annotation.ToLower()); } static AdmissionReview CreateInjectResponse(AdmissionReview originalRequest, bool allowed) { var res = new AdmissionResponse { Allowed = allowed, Status = new Status { Code = (int)HttpStatusCode.OK, Message = string.Empty } }; res.Uid = originalRequest.Request.Uid; return new AdmissionReview { ApiVersion = originalRequest.ApiVersion, Kind = originalRequest.Kind, Response = res }; } } ``` >### 编写ValidatingAdmissionWebhook控制器 tn2>创建`WebhookValidate.cs`文件,编写如下代码: ```csharp public static class WebhookValidate { private static string[]? _blockedRepos = null; public static AdmissionReview CheckImage(AdmissionReview reviewRequest) { if (_blockedRepos == null) { // 获取BLOCKED_REPOS环境变量值,拒接这些网址的容器 _blockedRepos = (Environment.GetEnvironmentVariable("BLOCKED_REPOS") ?? "").Split(","); } var allowed = true; // 判断请求的资源类型是不是Pod,是不是创建的请求,如果不是直接放行 if (reviewRequest.Request.Kind.Kind != "Pod" || reviewRequest.Request.Operation != "CREATE") { return CreateReviewResponse(reviewRequest, allowed); } // 序列化成一个Pod资源对象 var pod = JsonSerializer.Deserialize<V1Pod>(reviewRequest.Request.Object.GetRawText(), new JsonSerializerOptions() { PropertyNamingPolicy = JsonNamingPolicy.CamelCase }); // 判断序列化是否成功,如果序列化失败直接放行 if (pod == null) { return CreateReviewResponse(reviewRequest, allowed); } // 获取请求的Pod名称 var podName = string.IsNullOrEmpty(reviewRequest.Request.Name) ? pod.Metadata.GenerateName + "?" : reviewRequest.Request.Name; // 完整的pod名称 var fullPodName = $"{reviewRequest.Request.Namespace}/{podName}"; // 获取初始化容器与运行容器的镜像 var usedImages = new List<string>() .Concat(pod.Spec.Containers.NotEmpty().Select(c => c.Image)) .Concat(pod.Spec.InitContainers.NotEmpty().Select(c => c.Image)) .Distinct() .ToList(); var blockedImages = new List<string>(); // 拦截不允许的镜像地址 var blockedCount = usedImages.Select(img => { var shouldBlock = ImageBlocked(img); if (shouldBlock) { blockedImages.Add(img); Console.WriteLine($"Pod {fullPodName} 被拦截,因为使用被禁止的镜像 {img}"); } return shouldBlock; }).Count(b => b); // 判断是否有不可以通行的镜像 allowed = blockedCount == 0; // 创建放行结果 var res = CreateReviewResponse(reviewRequest, allowed); // 判断剩余的通行镜像 if (!allowed) { // 如果这些镜像不允许,将会进行如下操作 var imageList = string.Join(",", blockedImages); res.Response.Status.Message = $"dotnet webhook: Pod should not use these images: {imageList}"; } return res; } /// <summary> /// 判断不允许使用的镜像地址 /// </summary> /// <param name="imageLocation"></param> /// <returns></returns> static bool ImageBlocked(string imageLocation) { if (_blockedRepos!.Length == 1 && string.IsNullOrWhiteSpace(_blockedRepos[0])) { return false; } if (!imageLocation.Contains('/')) { imageLocation = "docker.io/" + imageLocation; } return _blockedRepos .Select(r => r.EndsWith('/') ? r : string.Concat(r, '/')) .Any(r => imageLocation.StartsWith(r)); } /// <summary> /// 放行 /// </summary> /// <param name="originalRequest"></param> /// <param name="allowed"></param> /// <returns></returns> static AdmissionReview CreateReviewResponse(AdmissionReview originalRequest, bool allowed) { var res = new AdmissionResponse { Allowed = allowed, Status = new Status { Code = (int)HttpStatusCode.OK, Message = string.Empty } }; res.Uid = originalRequest.Request.Uid; return new AdmissionReview { ApiVersion = originalRequest.ApiVersion, Kind = originalRequest.Kind, Response = res }; } } ``` tn2>关于放行输出的格式可以参考如下文档:https://kubernetes.io/zh-cn/docs/reference/access-authn-authz/webhook/ >### 编写Program.cs tn2>我们设置路由`/validate`将进行验证处理,`/mutate`则进行变更处理。 ```csharp using K8sWebhook; var builder = WebApplication.CreateBuilder(args); builder.Services.AddControllers(); builder.Services.AddEndpointsApiExplorer(); builder.Services.AddSwaggerGen(); var app = builder.Build(); app.UseSwagger(); app.UseSwaggerUI(); app.MapGet("/", () => "Hello .NET Kubernetes Webhook!"); app.MapPost("/validate", (AdmissionReview review) => Task.FromResult(WebhookValidate.CheckImage(review))); app.MapPost("/mutate", (AdmissionReview review) => Task.FromResult(WebhookMutate.InjectDotnetHelper(review))); app.Run(); ``` >### 打包 tn2>Dockerfile如下: ```bash FROM mcr.microsoft.com/dotnet/aspnet:6.0 AS base WORKDIR /app EXPOSE 80 FROM mcr.microsoft.com/dotnet/sdk:6.0 AS build WORKDIR /src COPY ["K8sWebhook/K8sWebhook.csproj", "K8sWebhook/"] RUN dotnet restore "K8sWebhook/K8sWebhook.csproj" COPY . . WORKDIR "/src/K8sWebhook" RUN dotnet build "K8sWebhook.csproj" -c Release -o /app/build FROM build AS publish RUN dotnet publish "K8sWebhook.csproj" -c Release -o /app/publish FROM base AS final WORKDIR /app COPY --from=publish /app/publish . ENTRYPOINT ["dotnet", "K8sWebhook.dll"] ``` tn2>当然也可以使用陈计节大佬编写的高山发布。 ```bash FROM mcr.microsoft.com/dotnet/sdk:7.0.100-preview.4-alpine3.15-amd64 as Builder WORKDIR /src/ COPY *.csproj /src/ RUN dotnet restore COPY . /src/ RUN mkdir /app && dotnet publish -c Release -p:PublishSingleFile=true -p:PublishTrimmed=true -r linux-musl-x64 --self-contained -o /app FROM alpine:3.15 RUN apk add bash icu-libs krb5-libs libgcc libintl libssl1.1 libstdc++ zlib WORKDIR /app COPY --from=Builder /app/* ./ ENTRYPOINT ["/app/K8sWebhook"] ``` tn>需要注意的是:我们打包的时候,由于openapi生成的代码在obj文件夹下面,所以我们需要将`.dockerignore`文件中的obj过滤给注释掉。   ```bash docker build -t aidasi/webhook:v1 -f Dockerfile .. docker push aidasi/webhook:v1 ```  >### 编写部署文件 tn2>编写`deploy.yaml`部署文件。 ```yaml --- apiVersion: v1 kind: Namespace metadata: name: kncs-system --- apiVersion: v1 kind: Secret metadata: name: kncs-server-certs namespace: kncs-system type: kubernetes.io/tls data: tls.crt: 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 tls.key: LS0tLS1CRUdJTiBSU0EgUFJJVkFURSBLRVktLS0tLQpNSUlFb3dJQkFBS0NBUUVBdXlpMnB0Yzc1ZXFUbkFYNEdCdmZRemo4a3dJZVBxVEhTeFU5a2lYWkovUkxRZ2F4CnBUUmROL3F0SkNFV1pJSE5QcUlVTnA2dGl5cXh3emhDNHlQc2RLckhESXh4ZCt4cU8wSndWY0w1STh0SGxPREgKY0pJUDM2L1ZKS0VBU2VPaWoyb3VPemRhcFlEWHZ2bnBWR0xDNGQrM2JNUzlxc1UyMVRLZWpTVU1kZmF1V05tdwpzNGk1eVRlVVA1WUl5Z0FlZFhEazllYzZaa1Q1MEVXYmFTVVB2Q0RYRkdjc2dlVDFKU2RyWDF6bDl1eXduMVlrClh2d3gyd0VYdTlHUGp1VExibEZISTNidEpNMlU2V2Rtcm9NaURKZjhXV095c0J0My9zNWNlZ25FNStIODFXNXQKZWR4WWc3MUMvUzVmOCtYWmxsb0YvcW15WHBmeEQzTHpBS0VsZXdJREFRQUJBb0lCQUQwUE1rL0tKbk9ERFRjNAp4MUR1UHUrS2R2UnJHM3pxZTA1bWxwaklta2tyclNYVVV6NkhqK1lFZFZvMUpUNFREdWZoTHVFRzhhMVdkM291Ckw3dzA2eDdBM0lHZWpDSkkwZnVWV0ZyU2FqK2dRVEUwQ0QwVW1mTXJSVWxXOFdZcHlzNHBJUDRXdUE4SXN0cE8KWkM0d3JrM01rK1g3WmJtQjc3cXNjZ2V3VDVsb0d6OGdKNG14dVF5MnR5SWF6d3VUQnBkbm5VUWh0QkJLZ2J1YwplYnpTS0luZ3RXa2o3SHlDWmVYY0xTdmpORzNGcEpWUXZZK1pncC9rbno1S042RFZXUkZNWThFV3BpTVVaVE1HCmVVVCtuSER4NkZlSVllNVBhRG41TWROTWhPOGZRYWdBVG9GcDRkRU5xb0l6RWVIWkZwOEJTODgwTXpTQSt0UTgKanNMaEt1RUNnWUVBNXYvTFptNXVaQ1RwNnY0NXJjQlRIM2VadXVmOVJ1Z01HYXJMS2tTS1RHZGZLMEg3dlVMZQpBSDlxalVuMExtSUxscVdmcHJiMC90eVBTUEFaSVhYY0FYQVA1TDJBdlJNNnQ1c0JXWk5HcnV5aVcyWkxTQzhQCnROQ3RHTkxmK0ZGQzJnZjlBTzZtZjhFRzlkYW9uNFdvKzZWU1FYMlRiOUZMYkxHWnByeDZjL0VDZ1lFQXoycEIKcnU1TE1ENS9abHpwY2xJNGg4RytpZ3dDcjM4K3V1NmdXRmZFZVRkYjk0cm1RclptM2xPQkxqVTBteExUTlUrVQp3NEVVQ3piR2xyYlNWRVZZL0s0Zi9ZZXBXazB4cjY3aUN1amd5ZzVSbDM5WFlMYXhxMVkvUzZ0TlNQdVQ2RjYzCkJMY1RYM3YrQ2RDR0Q5L0V1TWFEcTBJM0h5TjlOVkVPaCsrR2JDc0NnWUVBMk9MZ3Vnc0RrUGxydTl6NGtOL2IKNjlhaXUyK29TZFFEMEhHaEVjMkt3RlBxY2pZZ3c4R3RxVy80dmpIcWwwWXROVVBLazRDQ3BXeTNCN2VQRVBDVgpJYkJ5NjhUVnhERHkxNE10RUVxTWVoN3FEY0VNKy9oYjJkeDRPYTk4NUt4L2hURXM1cHdzTGhVeGtNNzhRZE1BCkowNUEzZ2FtMEwwRkFVZjdTU2I4SGpFQ2dZQTUrN2xxL3NEVU50U0V1RHFtcytlTHhCVFJJTFJyZlVYN0doU0gKUGRuMkRRelBzZXZYQUlqWFpENjd2VEg4bkJHaFdLTDgySXZTNnJndmorSlNucVJXMXhLb1hKRnlaaHdhd2VmOQpKc2NZbFZJbjZQaHpWLzlwSjQ1QVNCNHQ1ZTZlU2tRZHRGUmRJQnVQZ05USmdVUE1aK3FOS05DaUN0akkyK1VWCkNWZnB5d0tCZ0hvbERiZVRvbTZKbHppcnN0TXFlNUZwZ0NBQ0VIcDR1dkw1Tjk4TmlzWmNPRm05d1ZKcnErYVIKUVJDT1pXRnY0OTM1a2tFLzJnRDVzRnZYZzUzZmVjbmV2UFFWRytsbU1sUXRoSlR0NzRpTkZpRlBqRDR5Y0lDNQpCZG5yWkNDTWJMWHVUdEhiZmtIbXphRlExaUFKUTV0SkN3dG04TFVEd0YvMzM2bk5FN1RYCi0tLS0tRU5EIFJTQSBQUklWQVRFIEtFWS0tLS0tCg== --- apiVersion: apps/v1 kind: Deployment metadata: labels: app: kncs-webhook kncs: webhook name: kncs-webhook namespace: kncs-system spec: progressDeadlineSeconds: 600 replicas: 1 selector: matchLabels: kncs: webhook template: metadata: annotations: sidecar.istio.io/inject: "false" k8s.jijiechen.com/inject-dotnet-helper: "false" labels: kncs: webhook spec: containers: - env: - name: BLOCKED_REPOS value: abcd.com - name: ASPNETCORE_URLS value: 'https://+:443' - name: ASPNETCORE_Kestrel__Certificates__Default__Path value: /etc/kncs/certs/tls.crt - name: ASPNETCORE_Kestrel__Certificates__Default__KeyPath value: /etc/kncs/certs/tls.key # - name: Logging__LogLevel__Default # value: Debug # - name: Logging__LogLevel__Microsoft.AspNetCore # value: Debug # - name: DEBUG # value: 'true' # - name: Microsoft__AspNetCore__HttpLogging__HttpLoggingMiddleware # value: Information image: aidasi/webhook:v1 imagePullPolicy: IfNotPresent name: webhook ports: - containerPort: 443 protocol: TCP resources: requests: cpu: 50m memory: 128Mi volumeMounts: - mountPath: /etc/kncs/certs name: certs restartPolicy: Always schedulerName: default-scheduler volumes: - name: certs secret: defaultMode: 420 secretName: kncs-server-certs --- apiVersion: v1 kind: Service metadata: labels: app: kncs-webhook name: kncs-webhook namespace: kncs-system spec: ports: - name: https port: 443 protocol: TCP targetPort: 443 selector: kncs: webhook sessionAffinity: None type: ClusterIP --- apiVersion: admissionregistration.k8s.io/v1 kind: ValidatingWebhookConfiguration metadata: name: validating-webhook-kncs webhooks: - admissionReviewVersions: - v1beta1 - v1 clientConfig: caBundle: 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 service: name: kncs-webhook namespace: kncs-system path: /validate port: 443 failurePolicy: Fail name: image-validator.kncs.io namespaceSelector: {} objectSelector: {} rules: - apiGroups: - "" apiVersions: - v1 operations: - CREATE - UPDATE - DELETE resources: - pods scope: '*' sideEffects: None timeoutSeconds: 30 --- apiVersion: admissionregistration.k8s.io/v1 kind: MutatingWebhookConfiguration metadata: name: mutating-webhook-kncs webhooks: - admissionReviewVersions: - v1beta1 - v1 clientConfig: caBundle: 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 service: name: kncs-webhook namespace: kncs-system path: /mutate port: 443 failurePolicy: Fail name: dotnet-helper-injector.kncs.io namespaceSelector: {} objectSelector: {} rules: - apiGroups: - "" apiVersions: - v1 operations: - CREATE - UPDATE - DELETE resources: - pods scope: '*' sideEffects: None timeoutSeconds: 30 ``` tn2>关于细节我在后面会讲到。 >### 进行部署与测试 ```yaml kubectl apply -f deploy.yaml kubectl get all -n kncs-system ```  tn2>先测试不注入的情况。 ```bash kubectl run nginx --image=nginx kubectl get pod ```  tn2>测试需要注入的情况,我们写道一个`pod.yaml`的文件下面。 ```yaml apiVersion: v1 kind: Pod metadata: annotations: k8s.jijiechen.com/inject-dotnet-helper: 'true' labels: app: test name: webhook-tester-mutating namespace: default spec: containers: - args: - infinity command: - sleep image: centos:7 imagePullPolicy: IfNotPresent name: tester ``` ```bash kubectl apply -f pod.yaml kubectl get pod -w ```  tn2>测试注入成功。 同样我们可以测试注入的日志信息。 ```bash kubectl get pod -n kncs-system kubectl logs <pod名称> -n kncs-system -f ```  tn>抱歉这里判断是否已经注入有点点问题,我取反了哈哈哈!我等会再上传一个你们不会出现这个问题,程序是没问题的,输出日志取反了。 tn2>接下来我们创建一个镜像源来自`abcd.com`看看能不能创建 ```bash kubectl run aidasi --image=abcd.com/aidasi:v1 ```  tn2>我们发现直接报错了。 接着我们来看看日志,发现有一条被禁止的镜像。  tn2>到这里我们的Webhook就算完成了,下面我们来讲讲部署时`ValidatingWebhookConfiguration`和`MutatingWebhookConfiguration`所使用到的参数。 >### 相关参数说明 | 字段 | 描述 | | ------------ | ------------ | | `admissionReviewVersions` | 设置可以解析的API服务器版本。 | | `clientConfig` | 可以设置webhook的来源,它可以设置内部服务,也可以设置外部链接,我这里是设置内部提供的webhook服务。更多请参考:https://kubernetes.io/zh-cn/docs/reference/access-authn-authz/extensible-admission-controllers/ | | `clientConfig.caBundle` | 设置请求时的访问证书。 | | `clientConfig.service` | 指定的提供的webhook服务。 | | `clientConfig.service.namespace` | 提供服务的名称空间 | | `clientConfig.service.name` | 提供服务的服务名 | | `clientConfig.service.path` | 提供服务的路径 | | `clientConfig.service.port` | 提供服务的端口 | | `failurePolicy` | 定义了如何处理准入 webhook 中无法识别的错误和超时错误。允许的值为`Ignore`或 `Fail`。<br/>`Ignore` 表示调用 webhook 的错误将被忽略并且允许 API 请求继续。<br/>`Fail` 表示调用 webhook 的错误导致准入失败并且 API 请求被拒绝。<br/>准入 Webhook 所用的默认 `failurePolicy` 是 `Fail`。 | | `webhooks.name` | 资源名称 | | `webhooks.namespaceSelector` | Webhook 可以根据具有名字空间的资源所处的名字空间的标签来选择拦截哪些资源的操作。 | | `webhooks.objectSelector` | Webhook 能够根据可能发送的对象的标签来限制哪些请求被拦截。 | | `webhooks.rules` | 匹配请求规则 | | `webhooks.rules.operations` | 列出一个或多个要匹配的操作。 可以是`CREATE`、`UPDATE`、`DELETE`、`CONNECT` 或`*`以匹配所有内容。 | | `webhooks.rules.apiGroups` | 列出了一个或多个要匹配的 API 组。` ` 是核心 API 组。`*` 匹配所有 API 组。 | | `webhooks.rules.apiVersions` | 列出了一个或多个要匹配的 API 版本。`*` 匹配所有 API 版本。 | | `webhooks.rules.resources` | 列出了一个或多个要匹配的资源。 | | `webhooks.rules.scope` | 指定要匹配的范围。有效值为 `Cluster`、`Namespaced` 和 `*`。 子资源匹配其父资源的范围。默认值为 `*`。 | | `webhooks.sideEffects` | 副作用。简单来讲创建有没有问题。<br/>具体请参考:https://kubernetes.io/zh-cn/docs/reference/access-authn-authz/extensible-admission-controllers/#side-effects | | `webhooks.timeoutSeconds` | 用来配置在将调用视为失败之前,允许 API 服务器等待 Webhook 响应的时间长度。 | tn>代码地址:https://gitee.com/zuxiazijiahebo/k8s-plugs
欢迎加群讨论技术,1群:677373950(满了,可以加,但通过不了),2群:656732739
👈{{preArticle.title}}
👉{{nextArticle.title}}
评价
{{titleitem}}
{{titleitem}}
{{item.content}}
{{titleitem}}
{{titleitem}}
{{item.content}}
尘叶心繁
这一世以无限游戏为使命!
博主信息
排名
6
文章
6
粉丝
16
评论
8
文章类别
.net后台框架
164篇
linux
17篇
linux中cve
1篇
windows中cve
0篇
资源分享
10篇
Win32
3篇
前端
28篇
传说中的c
4篇
Xamarin
9篇
docker
15篇
容器编排
101篇
grpc
4篇
Go
15篇
yaml模板
1篇
理论
2篇
更多
Sqlserver
4篇
云产品
39篇
git
3篇
Unity
1篇
考证
2篇
RabbitMq
23篇
Harbor
1篇
Ansible
8篇
Jenkins
17篇
Vue
1篇
Ids4
18篇
istio
1篇
架构
2篇
网络
7篇
windbg
4篇
AI
17篇
threejs
2篇
人物
1篇
嵌入式
2篇
python
9篇
HuggingFace
8篇
pytorch
1篇
最新文章
最新评价
{{item.articleTitle}}
{{item.blogName}}
:
{{item.content}}
关于我们
ICP备案 :
渝ICP备18016597号-1
网站信息:
2018-2023
TNBLOG.NET
技术交流:
群号656732739
联系我们:
contact@tnblog.net
欢迎加群
欢迎加群交流技术