Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[aws-sigv4-proxy-admission-controller] Admission controller fails to recover if no pods are available to service requests #1088

Open
paulbraham-ds opened this issue Apr 10, 2024 · 1 comment
Labels
bug Something isn't working

Comments

@paulbraham-ds
Copy link

Describe the bug
A concise description of what the bug is.

By default the aws-sigv4-proxy-admission-controller mutating webhook is applied to all namespaces. This includes the namespace that the controller webhook deployment is running in. This creates an issue whereby if the controller webhook pods fail, it is not possible to start new pods, as there is nothing to service the webhook requests. This ultimately stops any further pods scheduling on a cluster.

Steps to reproduce

  • Deploy aws-sigv4-proxy-admission-controller helm chart
  • Delete all controller webhook pods created by deployment
  • Observe that further pods do not come back up.

Expected outcome
A concise description of what you expected to happen.
Failure of all pods in the aws-sigv4-proxy-admission-controller deployment should not be unrecoverable. If this namespace is excluded, when the pods can be rescheduled, it will recover.

Environment

  • Chart name: aws-sigv4-proxy-admission-controller
  • Chart version: 0.1.2
  • Kubernetes version: 1.27
  • Using EKS (yes), if so version? 1.27

Additional Context:

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working
Projects
None yet
Development

No branches or pull requests

1 participant