-
Notifications
You must be signed in to change notification settings - Fork 289
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support routing notifications to a given channel based on Kubernetes Sources #676
Comments
kubectl namespaces
and source bindings
Now in code exploration/spike mode. |
BTW @ezodude regarding the comments
I think there was a misunderstanding. I believe that's still a scope of this task, but this is definitely something to do in a follow-up PR (not in the first one) 🙂 And then we will have all parts together of the whole multi-workspace/multi-channel configuration epic. |
…allation/upgrade (#687) - Add ability to configure recommendations in granular way inside the config - Nest `recommendations` under Kubernetes source (`sources.'alias'.kubernetes`) - Post recommendations according to source configurations (full support will be introduced in #676) - Move recommendations out of filters - Add unit tests for all recommendations - Improve recommendation messages - Update E2E tests - Fix receiving events on other namespaces - Remove unused code
Ok, I see you extracted the namespaces functionality to a separate task. Closing it then 👍 |
Overview
User should be able to define different notification sources per a given channel based on the Kubernetes namespace. See the proposal section: https://github.com/kubeshop/botkube/blob/main/docs/proposal/2022-06-14-configuration-bindings.md#route-notifications-to-a-given-channel-based-on-the-kubernetes-namespace
Currently, the sources bindings introduced in new config are not supported:
botkube/helm/botkube/values.yaml
Lines 328 to 329 in 95918ec
The scope of this task is to:
support Kubernetes event namespace filtering by another property for(This has been de-scoped)kubernetes
sourceAcceptance Criteria
Add new(This has been de-scoped)namespace.include/exclude
property in thesources.'group-name'.kubernetes
according to the proposalbotkube-docs
repoReason
See epic #596.
The text was updated successfully, but these errors were encountered: