-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow manifest based registration of Admission webhooks. #1872
Comments
/sig api-machinery |
Hi @vivekbagade Enhancements Lead here. Can you please confirm that you will be working towards alpha in 1.20? Also could you please update the link in the description to link directly to the merged kep: https://github.com/kubernetes/enhancements/tree/master/keps/sig-api-machinery/1872-manifest-based-admission-webhooks Thanks! |
Hi @vivekbagade Any updates on whether this will be included in 1.20? Enhancements Freeze is October 6th and by that time we require: The KEP must be merged in an implementable state Thanks |
@lavalamp had expressed concerns on manifest based webhooks in #2074 (comment) I strongly feel that this mechanism as proposed helps administrators solve the problems mentioned in the KEP. Only current solution to which is having compiled in admission controllers. That said, the concerns Daniel mentions are apt to discuss. We need to make a call on this. I intend to target 1.21 with a complete implementation for this. |
(Current status: Vivek is going to explore bootstrapping objects from a file (and loading them into the cluster) in a future KEP.) |
@vivekbagade are you coming back to this? People are interested in the replacement :) |
I'd like to add another use case for this: staged rollout of admission changes to HA clusters. In other words, I'd like to be able to update the admission configuration for 1 api-server instance at a time to catch errors without bringing down the whole cluster. We could of course address this with an enhancement to the regular (dynamic) webhooks, but I think the static file approach would address it by default. |
Regular admission webhooks have this problem. I would definitely not want to solve it for only certain webhooks. Additionally, breaking "only" 1/Nth of the cluster traffic is actually a bad solution to this problem:
Anyway, the replacements to this approach at the moment are:
|
@lavalamp I agree that solving this in a general way makes sense. I filed kubernetes/kubernetes#102019 to capture the feature request. |
This issue can be closed based on #2822 |
Enhancement Description
Manifest based webhook configuration allows registering admission webhooks
during kube-apiserver start up allowing for no delays in policy enforcement
between policy addition and kube-apiserver startup.
The text was updated successfully, but these errors were encountered: