Explain that file-based pods cannot use secrets.
This commit is contained in:
@@ -1,4 +1,3 @@
|
||||
# Secret Distribution
|
||||
|
||||
## Abstract
|
||||
|
||||
@@ -184,6 +183,11 @@ For now, we will not implement validations around these limits. Cluster operato
|
||||
much node storage is allocated to secrets. It will be the operator's responsibility to ensure that
|
||||
the allocated storage is sufficient for the workload scheduled onto a node.
|
||||
|
||||
For now, kubelets will only attach secrets to api-sourced pods, and not file- or http-sourced
|
||||
ones. Doing so would:
|
||||
- confuse the secrets admission controller in the case of mirror pods.
|
||||
- create an apiserver-liveness dependency -- avoiding this dependency is a main reason to use non-api-source pods.
|
||||
|
||||
### Use-Case: Kubelet read of secrets for node
|
||||
|
||||
The use-case where the kubelet reads secrets has several additional requirements:
|
||||
|
Reference in New Issue
Block a user