You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
What would you like to be added:
I would like to add a label to determine whether a resource instance should be intercept by Kueue's MutatingAdmissionWebhook
Why is this needed:
Currently Kueue's MutatingAdmissionWebhook select all the job from all namespaces
Kueue shouldn't intercept resource instance that is not intended to be managed by Kueue
In our case, when Kueue is installing(or bootstraping), there's a job(Minio provisioning) running at the same time
since Kueue's mutating webhook select all job, the Minio provisioning job will be intercept, but I don't want it to be intercept by Kueue
At the same moment, Kueue's webhook isn't ready, so it'll fail
But the actual root cause is incorrect setup of mutating webhook, leading webhook to intercept the unrelated resource instance
here's the simplified reproduce step(to simulate the above issue we had)
$ helm install kueue oci://us-central1-docker.pkg.dev/k8s-staging-images/charts/kueue --version="v0.10.1" --create-namespace --namespace=kueue-system && kubectl create job my-job --image=busybox
Pulled: us-central1-docker.pkg.dev/k8s-staging-images/charts/kueue:v0.10.1
Digest: sha256:68658378dc673d3142d8dba222739c1ae2d3ef6742876f0249d599d0634b94da
NAME: kueue
LAST DEPLOYED: Tue Feb 4 01:00:12 2025
NAMESPACE: kueue-system
STATUS: deployed
REVISION: 1
TEST SUITE: None
error: failed to create job: Internal error occurred: failed calling webhook "mjob.kb.io": failed to call webhook: Post "https://kueue-webhook-service.kueue-system.svc:443/mutate-batch-v1-job?timeout=10s": no endpoints available for service "kueue-webhook-service"
Completion requirements:
This enhancement requires the following artifacts:
Design doc
API change
Docs update
The artifacts should be linked in subsequent comments.
The text was updated successfully, but these errors were encountered:
ambersun1234
changed the title
Kueue mutation admission webhook should intercept specific resource instance
Kueue mutation admission webhook should intercept specific resource instance only
Feb 3, 2025
Interesting! I was actually thinking of starting a discussion about this for Kueue for this but mostly for pod integration.
For pod integration, I am leaning towards a namespace labeling approach so that webhooks could only apply if a namespace is labeled. And I would prefer to flip the Kueue webhooks to be opt-in at the namespace level rather than exclude only a small subset of a cluster.
I did not really think that this would be necessary for Jobs but I can see why this may block other operators that may rely on one-time jobs.
I just have the default setting of Kueue(i.e. manageJobsWithoutQueueName: false)
also the Minio provisioning job is created by helm subchart, I didn't modify it
What would you like to be added:
I would like to add a label to determine whether a resource instance should be intercept by Kueue's MutatingAdmissionWebhook
Why is this needed:
Currently Kueue's MutatingAdmissionWebhook select all the job from all namespaces
Kueue shouldn't intercept resource instance that is not intended to be managed by Kueue
In our case, when Kueue is installing(or bootstraping), there's a job(Minio provisioning) running at the same time
since Kueue's mutating webhook select all job, the Minio provisioning job will be intercept, but I don't want it to be intercept by Kueue
At the same moment, Kueue's webhook isn't ready, so it'll fail
But the actual root cause is incorrect setup of mutating webhook, leading webhook to intercept the unrelated resource instance
here's the simplified reproduce step(to simulate the above issue we had)
Completion requirements:
This enhancement requires the following artifacts:
The artifacts should be linked in subsequent comments.
The text was updated successfully, but these errors were encountered: