kubehost
kubehost copied to clipboard
Expose web services directly on GKE nodes during development.
This confused me as can be seen in #2 and #8. The last line of bind prints IP address only, I think it should print tue port as well.
Homebrew is a convenient package manager for OS X, would be great to have `brew install kubehost`, like the [kubectx tools](https://github.com/ahmetb/kubectx).
`kubehost` has a documented limitation of only supporting services with a single port. Until this is addressed, we should output a warning message if a service is given that has...
We should include the port in the success message `"Service exposed on ${ip}"`, to make it clear which port the service was exposed on. https://github.com/GoogleContainerTools/kubehost/blob/71d2a859cfba7172351200f2f0debb4d900c47e8/kubehost#L412
More in line with `create-firewall` and `delete-firewall`. Prefer verbosity over saving a character.
First time I ran `kubehost -h` these commands confused me: ``` create-firewall : Create a GCP firewall rule for the hostPort deployment created with 'bind'. delete-firewall : Delete a GCP...
I understand kubehost just shells out to kubectl. So technically user just do `kubectl config set-context [...] --namespace=foo` prior to running kubehost. But it would be better if kubehost supported...
It seems like `kubehost bind` always binds to port 80. As far as I can tell, this prevents kubehost to be used with multiple exposed services at once (#2) as...
_This issue was automatically created by [Allstar](https://github.com/ossf/allstar/)._ **Security Policy Violation** Security policy not enabled. A SECURITY.md file can give users information about what constitutes a vulnerability and how to report...
_This issue was automatically created by [Allstar](https://github.com/ossf/allstar/)._ **Security Policy Violation** Found 1 outside collaborators with admin access. This policy requires users with this access to be members of the organisation....