You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: keps/sig-windows/2802-identify-windows-pods-apiserver-admission/README.md
+19-6Lines changed: 19 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -161,8 +161,10 @@ Additionally, there may be some end-user confusion on the functional consequence
161
161
162
162
- Pod Security Standards will be reviewed and updated to indicate which Pod OSes they apply to
163
163
- The restricted Pod Security Standard will be reviewed to see if there are OS-specific requirements that should be added
164
-
- The PodSecurity admission implementation will be updated to skip checks which do not apply to the Pod's OS.
165
-
- Unit and E2e tests which demostrate the PodSecurity admission plugin is behaving correctly with the new OS field.
164
+
- The PodSecurity admission implementation will be updated to skip checks which do not apply to the Pod's OS
165
+
- Unit and E2e tests which demostrate the PodSecurity admission plugin is behaving correctly with the new OS field
166
+
167
+
Pod Security Standards are to be changed in 1.25 timeframe to accommodate the supported kubelet and kube-apiserver skew.
166
168
167
169
168
170
### Changes to Kubelet
@@ -212,7 +214,6 @@ express scheduling constraints. During the alpha, we assume there are no schedul
212
214
If the feature gate is enabled there are some kubelet implications as the code to strip security constraints based on OS can be removed and we need to add
213
215
admission/denying in the kubelet logic which was mentioned above. Older Kubelets without this change will continue stripping the unnecessary fields in the pod spec which is the current behavior.
214
216
215
-
216
217
## Production Readiness Review Questionnaire
217
218
218
219
@@ -357,16 +358,28 @@ No
357
358
358
359
359
360
###### How does this feature react if the API server and/or etcd is unavailable?
360
-
361
+
The API validation would fail if API server and/or etcd is unavailable. The pod object won't be persisted to etcd.
361
362
362
363
###### What are other known failure modes?
363
-
364
+
- Windows Pod by passing windows specific validation and linux pods by passing linux specific validation even after `IdentifyPodOS` featuregate is enabled.
365
+
- Detection: Looking at `kube_pod_status_phase` metric
366
+
- Mitigations: Disable the `IdentifyPodOS` featuregate
367
+
- Diagnostics: Increasing the log-level of APIServer
368
+
- Testing: Yes, unit tests are already in place
369
+
- Both windows and linux pods are getting rejected when `IdentifyPodOS` featuregate is enabled.
370
+
- Detection: Looking at `apiserver_request_total` metric
371
+
- Mitigations: Disable the `IdentifyPodOS` featuregate
372
+
- Diagnostics: Increasing the log-level of APIServer
373
+
- Testing: Yes, unit tests are already in place
364
374
365
375
366
376
###### What steps should be taken if SLOs are not being met to determine the problem?
377
+
Disabling the `IdentifyPodOS` featuregate will help in determining the problem.
367
378
368
379
## Implementation History
369
-
380
+
- 2021-09-08: Initial KEP merged
381
+
- 2021-10-29: Initial implementation PR merged
382
+
- 2022-01-19: Graduate the feature to Beta proposed
0 commit comments