-
Notifications
You must be signed in to change notification settings - Fork 1.6k
KEP-2535: (Ensure Secret Pulled Images): add metrics, bump to beta in 1.34 #5371
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Did we consider splitting the cache directory into subdirectories based on a partial key?
This approach is common for on-disk content addressed caches to avoid having too many items in a single directory (see for example, git, ls -la .git/objects
).
That might be good to change before locking in these details and having users depending on the layout to debug.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We were briefly discussing this during design sessions but chose the flat design in the end. We shouldn't be hitting any directory limits. |
alpha: | ||
approver: "@jpbetz" | ||
beta: | ||
approver: "@jpbetz" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@jpbetz 👋
I chose you because you were doing PRR for alpha, please let me know in case you would like me to pick somebody else 🙏
/approve (Thanks @BenTheElder for the shadow review!) |
/assign @haircommander @mikebrow for SIG Node review |
8d61177
to
eb2ddfc
Compare
/lgtm |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
see suggestions for clarification and additional useful metrics based on kubelet policy vs image pull policy
|
||
This will allow an admin to see how many reverification checks are being requested for existing images and how | ||
many requests make it all the way to the persistent cache. | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
need some way to show the difference between a successful anonymous access request .. and having to try N different sets of credentials.... one image verification might take a large number of tries when a number of private sets of credentials are used on a large number of containers in a pod.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think that perhaps that may not matter as much for observability of this feature but rather for observability of image pulls, which today is not great - we don't seem to track anything besides how long an image pull took, and that is also only tracked in case of a successful pull..
If we're to track the number of pulls per image until success, I think we can do that even outside this KEP. Would you agree?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I agree this is a needed metric that exists without the ensure image kep. More specifically the number of attempted image pulls that fail due to incorrect credentials anonymous(pull 1) key ring entry 1(pull 2) private key 1(pull 3)
Failed credential looping on pull requests could cost more than actually pulling the images.
The other issue that could use a metric is cost of using :latest to connect and recheck manifests again and again...
d603818
to
bf26b21
Compare
Signed-off-by: Stanislav Láznička <slznika@microsoft.com>
Signed-off-by: Stanislav Láznička <slznika@microsoft.com>
This is now possible under the new template. Signed-off-by: Stanislav Láznička <slznika@microsoft.com>
Signed-off-by: Stanislav Láznička <slznika@microsoft.com>
Signed-off-by: Stanislav Láznička <slznika@microsoft.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: jpbetz, mikebrow, mrunalp, stlaz The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/cc enj liggitt mikebrow haircommander