You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
NOTE: for port 10250 the pod will need to have the right RBAC bindings (if RBAC is enabled) to view the metrics.
870
+
825
871
###### How can someone using this feature know that it is working for their instance?
826
872
827
873
<!--
@@ -838,8 +884,8 @@ Recall that end users cannot usually observe component logs or access metrics.
838
884
- [ ] API .status
839
885
- Condition name:
840
886
- Other field:
841
-
- [] Other (treat as last resort)
842
-
- Details:
887
+
- [x] Other (treat as last resort)
888
+
- Details:By replacing `nodes/proxy` permission in RBAC with the fine-grained permissions required by the workload such as `nodes/metrics`, `nodes/pods` etc. and then confirming that the requests to kubelet succeed and don't encounter authorization errors.
843
889
844
890
###### What are the reasonable SLOs (Service Level Objectives) for the enhancement?
845
891
@@ -858,6 +904,8 @@ These goals will help you determine what you need to measure (SLIs) in the next
858
904
question.
859
905
-->
860
906
907
+
Same SLOs as the kubelet API currently offers.
908
+
861
909
###### What are the SLIs (Service Level Indicators) an operator can use to determine the health of the service?
862
910
863
911
<!--
@@ -871,13 +919,17 @@ Pick one more of these and delete the rest.
871
919
- [ ] Other (treat as last resort)
872
920
- Details:
873
921
922
+
Same SLIs as the kubelet API currenlty offers.
923
+
874
924
###### Are there any missing metrics that would be useful to have to improve observability of this feature?
875
925
876
926
<!--
877
927
Describe the metrics themselves and the reasons why they weren't added (e.g., cost,
878
928
implementation difficulties, etc.).
879
929
-->
880
930
931
+
No.
932
+
881
933
### Dependencies
882
934
883
935
<!--
@@ -901,6 +953,8 @@ and creating new ones, as well as about cluster-level services (e.g. DNS):
901
953
- Impact of its degraded performance or high-error rates on the feature:
902
954
-->
903
955
956
+
This feature only comes into play if kubelet authotization mode is set to Webhook.
957
+
904
958
### Scalability
905
959
906
960
<!--
@@ -1024,6 +1078,9 @@ details). For now, we leave it here.
1024
1078
1025
1079
###### How does this feature react if the API server and/or etcd is unavailable?
1026
1080
1081
+
Not any diferent from how it would affect kubelet without this feature. If kube-apiserver
1082
+
is unavailable any SAR from kubelet will fail.
1083
+
1027
1084
###### What are other known failure modes?
1028
1085
1029
1086
<!--
@@ -1039,8 +1096,22 @@ For each of them, fill in the following information by copying the below templat
1039
1096
- Testing: Are there any tests for failure mode? If not, describe why.
1040
1097
-->
1041
1098
1099
+
If requests to kubelet API start failing due to authorization issues users can
1100
+
disabled the feature-gate.
1101
+
1102
+
Users can check the kubernetes Audit logs for SubjectAccessReview requests
1103
+
created by `system:nodes:*` and check the reason they failed.
1104
+
1042
1105
###### What steps should be taken if SLOs are not being met to determine the problem?
1043
1106
1107
+
1. Check that the feature gate is enabled in kube-apiserver and kubelet.
1108
+
2. Check that the workload has the right permissions. Requesets are expected to
1109
+
fail if you are using fine-grained subresources but the feature gate is not enabled
1110
+
in kubelet.
1111
+
3. Check the audit logs for SubjectAccessReview requests created by `system:nodes:*`
1112
+
and check the reason these requests failed.
1113
+
4. Check kubelet logs.
1114
+
1044
1115
## Implementation History
1045
1116
1046
1117
<!--
@@ -1054,6 +1125,10 @@ Major milestones might include:
1054
1125
- when the KEP was retired or superseded
1055
1126
-->
1056
1127
1128
+
2024-09-28: [KEP-2862](https://github.com/kubernetes/enhancements/pull/4760) merged as implementable and PRR approved for ALPHA.
0 commit comments