Skip to content

Commit c1b7c2e

Browse files
committed
KEP-4412: update resource usage question for ServiceAccountNodeAudienceRestriction
Signed-off-by: Anish Ramasekar <[email protected]>
1 parent 52ee1f6 commit c1b7c2e

File tree

1 file changed

+6
-1
lines changed
  • keps/sig-auth/4412-projected-service-account-tokens-for-kubelet-image-credential-providers

1 file changed

+6
-1
lines changed

keps/sig-auth/4412-projected-service-account-tokens-for-kubelet-image-credential-providers/README.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1082,7 +1082,12 @@ This through this both in small and large cases, again with respect to the
10821082
[supported limits]: https://git.k8s.io/community//sig-scalability/configs-and-limits/thresholds.md
10831083
-->
10841084

1085-
No.
1085+
As part of the `ServiceAccountNodeAudienceRestriction` feature, KAS will need to watch PersistentVolumeClaims, PersistentVolumes and CSIDrivers
1086+
to determine the audiences that the kubelet is allowed to generate service account tokens for. These new informers (which are feature gated) will
1087+
result in additional resource usage in the KAS.
1088+
- Node authorizer is already watching persistent volumes via informers today.
1089+
- CSIDriver objects are expected to be ~few and ~slow-moving, so the impact is expected to be minimal.
1090+
- PersistentVolumeClaims are expected to be more numerous and more dynamic, so there could be more impact here.
10861091

10871092
###### Can enabling / using this feature result in resource exhaustion of some node resources (PIDs, sockets, inodes, etc.)?
10881093

0 commit comments

Comments
 (0)