-
Notifications
You must be signed in to change notification settings - Fork 160
Added support for NVME Hyperdisks on Windows Nodes #2114
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
The committers listed above are authorized under a signed CLA. |
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: ivanLeont The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Welcome @ivanLeont! |
Hi @ivanLeont. Thanks for your PR. I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
Adding a note here: This still works even if the GKE cluster has Workload Identity, as the Daemonset kube-system/gke-metadata-server that manages metadata access, seems to allow the SA pdcsi-node-sa (which is used by the pdcsi-node-windows Daemonset) to bypass all metadata restrictions, which compared to a user created SA has more restricted access to the metadata. I have confirmed this by creating a pod that uses the SA pdcsi-node-sa and was able to access the necessary disk data. |
Hmm, super interesting, this isn't expected. Can you give details of your setup? gcloud compute instances describe as well as kubectl get -o yaml for both the node and the pd csi daemonset deployment you use with this PR? Thx. |
/ok-to-test |
@ivanLeont: The following test failed, say
Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
Here are the details of the setup: gke-metadata-server.txt When deploying a cluster with Workload Identity enabled, i noticed that after running ./deploy-drivers.sh, the windows node images deployed by the DS
I then enabled the default CSI and noticed that the windows image there was not crashing at that point, so I created two pods in both namespaces with different SA's This pod,
In this pod,
So when I used a webhook to swap the original image in the DS kube-system/pdcsi-node-windows my custom image was able to work fine. It was also observed that in the gke-metadata-server DS, there is a field Let me know if you need any more details! 😃 |
ahhh interesting we didn't know the security team did that :-P Let us figure out if this is the right way to go, then |
What type of PR is this?
/kind feature
What this PR does / why we need it:
This PR fixes the ability to use hyperdisks/nvme drives on window's nodes. This works by having the CSI node query Google's API to extract the correct serial number of the hyperdisk and match it to the correct index/serial of the mounted disk on windows.
Which issue(s) this PR fixes:
Fixes # N/A
Special notes for your reviewer:
Does this PR introduce a user-facing change?: