-
Notifications
You must be signed in to change notification settings - Fork 54
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
vpc-resource-validating-webhook causing pods to fail to create sporadically even though we're not using it #38
Comments
@Chili-Man dynamically enabling/disabling the webhook based on feature flags is not supported as it would require installing and uninstalling Would it be possible to share your cluster ARN along with the time frame when you saw this issue at [email protected]. I would like to root cause if the issue is due to a bug in the webhook or the issue manifested due to some other dependency being unhealthy. We can evaluate one enhancement in the webhook i.e to allow admission to all Pods without any checks when |
hey @abhipth thanks for the response; I've sent you a follow up email with the requested information. we appreciate the help! |
Based on the offline discussion with @Chili-Man we discovered that the failure mode can be triggered in the following scenario.
If the cache has not been updated with the new Service Account when a request to create new Pod in intercepted by the Webhook then the user could see this error. For any other user that may have been seeing this error, as a short term resolution you could add a small delay between the SA creation and the Pod Creation using the this SA. We are evaluating simply allowing all Pods bypassing the SA check when the SGP feature is disabled. |
We are also running into this issue. It introduces flakes in our own controller loop luckily we have automatic retries. |
@stijndehaes thanks for reaching out to us for another case. We haven't been able to finalize the attemption to dynamically check if the SGP feature is enabled due to various customized ways enabling the feature from VPC CNI. We will keep looking for a reliable way to avoid the webhook interfering with non-SGP pods creation. |
Describe the Bug:
We don't use the security group for pods feature, so we should not get errors creating pods.
We tried to create the a regular pod but recieved the following error message from the webhook
https://github.com/aws/amazon-vpc-resource-controller-k8s/blob/master/webhooks/core/pod_webhook.go#L94
I didn't even know that this admission webhook was installed by default on the EKS clusters until we got this error message.
Observed Behavior:
We got an error from this webhook when trying to create a pod.
Expected Behavior:
I expect that admission webhook to not cause any issues especially since we're not using the pod security group feature
How to reproduce it (as minimally and precisely as possible):
We're not sure how to reproduce it, this issue happens rarely after creating lots of pods over time.
Additional Context:
Environment:
kubectl version
): v1.19.6-eks-49a6c0The text was updated successfully, but these errors were encountered: