-
Notifications
You must be signed in to change notification settings - Fork 174
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Standard Label for Excluding Pod from Identity Mounting #215
Comments
Can't we simply avoid this by not using the Service Account that is enabled for Pod Identity webhook? |
I am not sure I understand your suggestion. How do Service Accounts fit into the mutating webhook flow? |
What exactly prevents CNI from coming up? This webhook sets |
At least in our case, we rely on
IMO, Having a webhook with the |
One other thing I realized I should add: I could see a case as well where a customer wants to disable the Pod Identity Webhook as a performance optimization, independent of the failure mode. For example, if leveraging DoEKS, they may not need IAM roles on Spark worker pods. |
Looks like this issue was resolved in the proposed PR linked above (#216) I appreciate the feedback on Marking this issue as closed. |
What would you like to be added?
It would be useful to have a standard label that excludes pods from being processed by the identity webhook.
Proposed Change: #216
Why is this needed?
Removing Cyclical Dependencies - When installing a CNI and the Pod Identity Webhook onto our clusters, we identified a cyclical dependency; the identity webhook needs the network/CNI to be successfully operating to be able to communicate with the backend service, and the CNI needs the identity webhook to be functioning in order to schedule pods. The CNI doesn't rely on Amazon identities, so having a mechanism to skip the identity webhook for some pods (including the CNI) would remove this cyclical dependency.
Performance/Reliability - Having the ability to exclude pods that don't need Amazon identities can reduce load on the webhook and improve pod launching performance. This also removes a critical dependency for services that need to be resilient to failure.
Standardization is key to compatibility- Having a canonical tag for skipping the identity webhook will make it easier for downstream projects to exclude critical components (such as CNIs) from the webhook, leading to a better out-of-the-box experience.
The text was updated successfully, but these errors were encountered: