-
Notifications
You must be signed in to change notification settings - Fork 58
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix(helm): fix the namespaceSelector that prevents the webhook from running in the release namespace #90
fix(helm): fix the namespaceSelector that prevents the webhook from running in the release namespace #90
Conversation
…unning in the release namespace
Thanks, this looks like it was indeed a bug in regards to the namespace name. I just ran into this myself on another project. Dropping the link to the comment we found that explained this: kubernetes/kubernetes#92157 (comment). The other option would be to opt-in to running it on specific namespaces which might be more appropriate? |
I think I actually like this more, but it will take a bit more work in the chart to make this possible. So basically we'd have a Open to ideas here. My priority is at least fixing what's already there ahead of my windows workloads hitting production. |
I guess it would be a breaking change to require opt in, but could manage that through the helm option maybe? Opting out seems like a fine addition and could potentially be used together I think. |
Yeah, helm value could just default to opt-out, which wouldn't break anyone. |
sounds good, could be a follow up PR if you are interested /lgtm |
/approve |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: acobaugh, marosset The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
I noticed my cluster would get wedged any time the gmsa webhook pods weren't running. I've determined the
namespaceSelector
s for the webhook configurations are not correct.This PR fixes this, and also allows an additional
label
to be used onnamespaces
(windows.k8s.io/disabled: true
) to allow the webhooks to be skipped in other namespaces. I just picked that name, but I'm open to using something else. At least in my cluster, there are other namespaces besideskube-system
that are critical (karpenter
,istio-system
, etc) which will never have windows pods in them, but should still be able to function if gmsa is down.