-
Notifications
You must be signed in to change notification settings - Fork 54
[FR] add tainted annotation to Pods that have been execed into #9
Comments
This is a good idea. Can you elaborate on the OPs process you have in mind that works with the label? |
I assume #18 should cleanup the the tainted pod. I missed the issue when reading this. For the grace periodic of the reconciliation task would need to know another timestamp to compare the elapsed time. |
Yes, #18 is related. I was thinking the same thing during the WIP mentioned in the other issue. There is an exec taint annotation and the value is a timestamp. Eventually it would be pretty nice to have a DaemonSet that could automatically capture forensic information on a Pod prior to it getting evicted. Until then, I like your idea of an annotation that could prevent the post-exec eviction. |
Thinking about this a bit more for the spike, I would rather use a label than an annotation. A label can be queried easily and also shows up in (prometheus) monitoring. The timestamp and "no-evict-overwrite" should be annotations though. |
PR 47 was closed in favor of: #54 |
👋 The k-rail project has been deprecated and is no longer under active development. We recommend taking a look at OPA Gatekeeper to see if it might meet your needs going forward. Thanks for your contribution(s) to the project! |
When a Pod has been execed into, a annotation should be added to the Pod to indicate that.
Maybe
k-rail.cruise-automation.github.com/taint/exec: <timestamp>
The text was updated successfully, but these errors were encountered: