@@ -80,7 +80,7 @@ authorizer.
80
80
Cluster administrators should be able to specify more than one authorization
81
81
webhook in the API Server handler chain. They also need to be able to
82
82
declaratively configure the authorizer chain using a configuration file. It
83
- should also be easy to say when to Deny requests, for example, when a webhook
83
+ should also be easy to say when to deny requests, for example, when a webhook
84
84
is unreachable.
85
85
86
86
### Goals
@@ -256,7 +256,7 @@ if certain conditions are satisfied, except for the `system:masters` user group.
256
256
# ### Story 4: Controlling access of a privileged RBAC role
257
257
258
258
Certain users associated with a privileged role might need to have their access
259
- scoped to certain namespaces. Having ordered authorisation modes allows the
259
+ scoped to certain namespaces. Having ordered authorization modes allows the
260
260
administrator to add a webhook restricting certain user tokens before RBAC
261
261
grants access to the user.
262
262
@@ -278,7 +278,7 @@ webhook request can be skipped.
278
278
279
279
- In HA clusters, there may be a skew in how the `kube-apiserver` processes in
280
280
each are configured. This may create inconsistencies. Mitigation is to have the
281
- cluster bootstrapper handle such scenarios.
281
+ cluster administrator handle such scenarios.
282
282
- In case an administrator enables this feature and the webhook kubeconfig file
283
283
is invalid or doesn't exist at the specified path, `kube-apiserver` on that node
284
284
will not be able to start. This can be mitigated by fixing the malformed values.
631
631
632
632
# ##### Is the rollout accompanied by any deprecations and/or removals of features, APIs, fields of API types, flags, etc.?
633
633
634
- None.
634
+ Existing command line flags will be marked as deprecated and config file will take
635
+ precedence over the old flags once this feature graduates to GA. Then for GA + 3 releases,
636
+ the existing command line flags will be removed.
635
637
636
638
# ## Monitoring Requirements
637
639
@@ -655,7 +657,10 @@ Or, they can look at the metrics exposed by `kube-apiserver`.
655
657
# ##### How can someone using this feature know that it is working for their instance?
656
658
657
659
- [x] Other
658
- - Details : They can look at the metrics if `apiserver_authorization_decisions_total` is increasing.
660
+ - Details : Since this feature introduced the `name` field to the webhook authorizer,
661
+ users can first specify a value in the `name` field of the AuthorizationConfiguration.
662
+ Then look at the `apiserver_authorization_webhook_evaluations_total` metrics to ensure the
663
+ count for the named webhook authorizer is increasing.
659
664
660
665
# ##### What are the reasonable SLOs (Service Level Objectives) for the enhancement?
661
666
0 commit comments