-
Notifications
You must be signed in to change notification settings - Fork 420
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CI testing improvements #2734
CI testing improvements #2734
Conversation
Signed-off-by: chipzoller <[email protected]>
Signed-off-by: chipzoller <[email protected]>
Signed-off-by: chipzoller <[email protected]>
Signed-off-by: chipzoller <[email protected]>
@chipzoller Really awesome! Glad that we can now test deployments of these common configurations upon each PR. Only a few minor comments here, mostly questions for clarity. Also, is there any reason the |
Great questions, as always.
No particular reason, I suppose. I used an existing config in the PoC repo plus your suggestions (plus a couple of my own, ex., enabling network costs) to come up with this manifest. If we can slim it down that'd be ideal. Do you have any recommendations? |
How about using these values for the Aggregator? ( |
Can I opt out of using an existing ServiceAccount? This will reduce the dependencies by one. It doesn't impact the ability to determine if aggregator works properly, correct? |
Is this the ServiceAccount you're referring to? Aggregator shouldn't need it!
|
Can |
Hey @thomasvn, can you help me refine this so we can get it in? |
@chipzoller Thoughts on omitting Even if we put a dummy string here, it wouldn't be testing much functionality. And we also wouldn't want to be putting a valid key in these CI tests unless it's possible to store this secret outside git. |
Omitting that sounds good, I just don't know what happens if the value isn't provided. Can you summarize the changes you'd like to see in this PR? |
by default, no value is needed. The majority of installs are free. |
But can it be null or does it have to be |
@chipzoller Happy to get this PR in ASAP! No major concerns with it. I think as a minor improvement we can use a much more minimal When I configured a minimal aggregator, these were the only configs I needed: # kubectl create secret generic federated-store --from-file=federated-store.yaml
# kubectl create secret generic cloud-integration --from-file=cloud-integration.json
kubecostAggregator:
enabled: true
cloudCost:
enabled: true
aggregatorStorage:
storageRequest: 5Gi
aggregatorDbStorage:
storageRequest: 10Gi
kubecostModel:
federatedStorageConfigSecret: federated-store
kubecostProductConfigs:
cloudIntegrationSecret: cloud-integration |
Signed-off-by: chipzoller <[email protected]>
Signed-off-by: chipzoller <[email protected]>
|
GitGuardian id | Secret | Commit | Filename | |
---|---|---|---|---|
- | Google API Key | de86fff | cost-analyzer/templates/aggregator-statefulset.yaml | View secret |
🛠 Guidelines to remediate hardcoded secrets
- Understand the implications of revoking this secret by investigating where it is used in your code.
- Replace and store your secret safely. Learn here the best practices.
- Revoke and rotate this secret.
- If possible, rewrite git history. Rewriting git history is not a trivial act. You might completely break other contributing developers' workflow and you risk accidentally deleting legitimate data.
To avoid such incidents in the future consider
- following these best practices for managing and storing secrets including API keys and other credentials
- install secret detection on pre-commit to catch secret before it leaves your machine and ease remediation.
🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request.
Our GitHub checks need improvements? Share your feedbacks!
@thomasvn, made the changes. Please review. |
What does this PR change?
Closes #2708
Closes #2515
This PR dramatically expands and improves chart testing in this repository by setting up an extensible framework, documenting it, and adding 3 files which cover most of the common Kubecost deployment configurations. For further details on this PR, see the DEVELOPMENT.md guide contained herein.
Does this PR rely on any other PRs?
No
How does this PR impact users? (This is the kind of thing that goes in release notes!)
No user impact. This is internal only.
Links to Issues or tickets this PR addresses or fixes
What risks are associated with merging this PR? What is required to fully test this PR?
CI could break.
How was this PR tested?
Extensive testing in fork.
Have you made an update to documentation? If so, please provide the corresponding PR.
Developer docs updated in DEVELOPMENT.md