-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
KEP-2907: secrets store csi driver #2939
Conversation
114274c
to
a58ace4
Compare
a58ace4
to
8dcee74
Compare
Signed-off-by: Anish Ramasekar <[email protected]>
cc8ee2b
to
4e49369
Compare
/cc @mikedanese |
--> | ||
|
||
###### What are the reasonable SLOs (Service Level Objectives) for the enhancement? | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
failure in pod creation?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I dont think we can get a time-series metric for that from the kubelet
or the kube-apiserver
, but some kubelet measurement of failed volume mounts would be useful as there is an error mode where the request does not make it to the driver process because of issues registering the driver with the kubelet.
We could maybe use kubectl get events --field-selector="reason=FailedMount" --all-namespaces
but that can be hard to monitor and there does not appear to be an event
for successful Mount
operations.
Signed-off-by: Anish Ramasekar <[email protected]>
c29249d
to
cae255b
Compare
Signed-off-by: Anish Ramasekar <[email protected]>
After the discussion in the last sig-auth call, we have promoted our crds to @mikedanese @ritazh This KEP should be ready for another round of review. Once this has cc @tam7t |
This PR adds:
After this PR to add the KEP is merged we'll cut a |
/lgtm |
- Supports windows containers (Kubernetes version v1.18+) | ||
- [KEP 1855: Service Account Token for CSI Driver](https://github.com/kubernetes/enhancements/tree/master/keps/sig-storage/1855-csi-driver-service-account-token) | ||
|
||
The driver uses CSI Inline Volumes to mount the external secrets-store objects in the pod. The CSI Inline Volumes feature is enabled by default in Kubernetes 1.16+. For windows containers, the CSI Inline Volumes feature is enabled by default in Kubernetes 1.18+. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
While that's correct, the feature is still only in beta and API changes are needed before it can be promoted. That has stalled due to a lack of volunteers to work on the feature.
You probably should turn this into a dependency on #596
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ah thanks for pointing that out!
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: mikedanese, tam7t The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
This didn't actually go through PRR |
I've added a PRR file in #3007 |
This PR adds:
secrets-store-csi-driver
sig-auth subprojectAfter this PR to add the KEP is merged we'll cut a
v1.0.0
stable release for the driver. Post release, we'll open a PR to update thestage
tostable
in the kep.yaml.