Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

KEP 1710: Update SELinux mount ReadWriteOnce optimization for 1.26 #3548

Closed
wants to merge 2 commits into from

Conversation

jsafrane
Copy link
Member

@jsafrane jsafrane commented Sep 26, 2022

Update "Speed up recursive SELinux label change" for Kubernetes 1.26

The feature stays in alpha in 1.26.

@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: jsafrane

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added the kind/kep Categorizes KEP tracking issues and PRs modifying the KEP directory label Sep 26, 2022
@k8s-ci-robot k8s-ci-robot added sig/storage Categorizes an issue or PR as relevant to SIG Storage. approved Indicates a PR has been approved by an approver from all required OWNERS files. size/M Denotes a PR that changes 30-99 lines, ignoring generated files. labels Sep 26, 2022
@jsafrane
Copy link
Member Author

Not sure if it's needed, the feature was alpha in 1.25 and stays so in 1.26
/label lead-opted-in

@k8s-ci-robot k8s-ci-robot added the lead-opted-in Denotes that an issue has been opted in to a release label Sep 26, 2022
@jsafrane jsafrane changed the title Update SELinux for 1.26 KEP 1710: Update SELinux for 1.26 Sep 26, 2022
@jsafrane jsafrane force-pushed the update-selinux-alpha branch from 470fa93 to c43f6d6 Compare September 26, 2022 10:14
@k8s-ci-robot k8s-ci-robot added the cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. label Sep 26, 2022
@rhockenbury rhockenbury removed the lead-opted-in Denotes that an issue has been opted in to a release label Sep 26, 2022
@sftim
Copy link
Contributor

sftim commented Oct 10, 2022

/retitle KEP 1710: Update SELinux mount ReadWriteOnce optimization for 1.26

@k8s-ci-robot k8s-ci-robot changed the title KEP 1710: Update SELinux for 1.26 KEP 1710: Update SELinux mount ReadWriteOnce optimization for 1.26 Oct 10, 2022
@msau42
Copy link
Member

msau42 commented Oct 26, 2022

/assign @gnufied @jingxu97
to review reconstruction design changes

@jsafrane
Copy link
Member Author

I am linking all volume reconstruction PRs to this enhancement update - I am trying to make as small and independent PRs as possible.

@msau42
Copy link
Member

msau42 commented Oct 27, 2022

I know we're changing this as part of the SELinux work but I wonder if it's worth having a separate doc just for reconstruction in general. There are other issues that would be great to fix such as reconstructing global mounts, and supporting non-mounting csi drivers.

@jsafrane jsafrane force-pushed the update-selinux-alpha branch from 869fba3 to 6e0342b Compare October 31, 2022 11:57
@jsafrane
Copy link
Member Author

separate doc just for reconstruction in general

That sounds good. Where the document should be? We still have https://github.com/kubernetes/community/tree/master/contributors/devel/sig-storage, but IMO it's not a good place.

This metric captures nr. of failed Pod starts, including periodic retries.
1. `volume_manager_selinux_volume_context_mismatch_errors_total` + `volume_manager_selinux_volume_context_mismatch_warnings_total`: Number of errors when a Pod uses a volume that is already mounted with a different SELinux context than the Pod needs.
Before this feature, both pods would start, but only one such pod could access the volume.
With this feature, one of the Pods won't even start.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We briefly discussed rejecting such pods via pod admission in future. Are we still planning to do that?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Kubelet admission already rejects RWOP pods that use a volume that is already used.

We could add the same for Pods with mismatching SELinux contexts, however, some volume types (e.g. NFS) might support a volume mounted on a node several times with different contexts.

@jsafrane
Copy link
Member Author

separate doc just for reconstruction in general

I opened #3763

@jsafrane
Copy link
Member Author

/close
in favor of #3797

@k8s-ci-robot
Copy link
Contributor

@jsafrane: Closed this PR.

In response to this:

/close
in favor of #3797

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. kind/kep Categorizes KEP tracking issues and PRs modifying the KEP directory sig/storage Categorizes an issue or PR as relevant to SIG Storage. size/M Denotes a PR that changes 30-99 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

7 participants