Explain that file-based pods cannot use secrets.

This commit is contained in:
Eric Tune
2015-05-28 17:21:32 -07:00
parent 16d3531e90
commit 7fee4de41d
2 changed files with 11 additions and 1 deletions

View File

@@ -1,4 +1,3 @@
# Secret Distribution
## Abstract
@@ -184,6 +183,11 @@ For now, we will not implement validations around these limits. Cluster operato
much node storage is allocated to secrets. It will be the operator's responsibility to ensure that
the allocated storage is sufficient for the workload scheduled onto a node.
For now, kubelets will only attach secrets to api-sourced pods, and not file- or http-sourced
ones. Doing so would:
- confuse the secrets admission controller in the case of mirror pods.
- create an apiserver-liveness dependency -- avoiding this dependency is a main reason to use non-api-source pods.
### Use-Case: Kubelet read of secrets for node
The use-case where the kubelet reads secrets has several additional requirements: