Skip to content

Commit d3d2360

Browse files
committed
node: podresources: clarify GA blockers
Clarify GA blockers as asked in kubernetes#3791 (review) kubernetes#3791 (comment) - Explicitely added windows support (and all the other platforms supported by device plugins) as GA condition. - Added DOS prevention as GA condition, and clarified the perimeter of the DOS attack surface area. Signed-off-by: Francesco Romani <[email protected]>
1 parent c80f656 commit d3d2360

File tree

1 file changed

+5
-1
lines changed
  • keps/sig-node/606-compute-device-assignment

1 file changed

+5
-1
lines changed

keps/sig-node/606-compute-device-assignment/README.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -200,6 +200,8 @@ covered by e2e tests
200200
- [X] Multiple real world examples ([Multus CNI](https://github.com/intel/multus-cni)).
201201
- [X] Allowing time for feedback (2 years).
202202
- [X] [Start Deprecation of Accelerator metrics in kubelet](https://github.com/kubernetes/kubernetes/pull/91930).
203+
- [X] The API endpoint should be available on all the platforms kubelet runs and supports device plugins (linux, windows, ...).
204+
- [X] Rate limiting mechanisms are implemented in the server to prevent excessive load from malfunctioning/rogue clients.
203205
- [X] Risks have been addressed.
204206

205207
### Upgrade / Downgrade Strategy
@@ -323,7 +325,9 @@ No. Feature is out of existing any paths in kubelet.
323325

324326
###### Will enabling / using this feature result in non-negligible increase of resource usage (CPU, RAM, disk, IO, ...) in any components?
325327

326-
In 1.18, DDOSing the API can lead to resource exhaustion. It is planned to be addressed as part of G.A.
328+
In 1.18, DOSing the API can lead to resource exhaustion. It is planned to be addressed as part of G.A.
329+
The API is exposed only through a unix-domain socket local to the node, so malicious agents can only be among pods running on the same node (e.g.
330+
no network access) which have been granted permission to access the unix domain socket with volume mounts and filesystem permissions.
327331
Feature only collects data when requests comes in, data is then garbage collected. Data collected is proportional to the number of pods on the node.
328332

329333
###### Can enabling / using this feature result in resource exhaustion of some node resources (PIDs, sockets, inodes, etc.)?

0 commit comments

Comments
 (0)