feat: add default toleration to tolerate all taints#215
feat: add default toleration to tolerate all taints#215vikram-katkar wants to merge 7 commits intoaws:mainfrom
Conversation
Codecov ReportPatch and project coverage have no change.
Additional details and impacted files@@ Coverage Diff @@
## main #215 +/- ##
=======================================
Coverage 53.15% 53.15%
=======================================
Files 8 8
Lines 730 730
=======================================
Hits 388 388
Misses 332 332
Partials 10 10 ☔ View full report in Codecov by Sentry. |
|
This is open for a while. Do you know @simonmarty if this can be reviewed? (not sure who will it be but saw that you contributed to one file recently so tagged you 🙂 ) |
|
Could you explain your use case? Helm chart configuration options can be overriden based on your needs. Why does this need to be merged back into the default configuration? |
|
Yes I was able to work around this by setting the tolerations but I wasn't sure if it should be set as default? I am still new to EKS and saw this issue (#267). If we can't set that as default, may be we can add it in troubleshooting? I followed the docs to use csi driver provider for secrets manager and ran into this issue. |
|
@simonmarty Setting it as the default would save users from this hassle. |
|
I'm good to merge this based on the above info and the fact that the Secrets Store CSI Driver does the same thing in their helm chart |
|
Another consideration before making this the default is that it works the other way when running some workloads on Fargate. When tolerating the Fargate nodes' taint, a DeamonSet will try to schedule pods on said nodes, which does not work. I've had to remove the default "tolerate all taints" from a number of chart defaults because of this (and it can be a PITA to work out exactly which magic incantations to use to get the correct value through Terraform and then Helm with their template languages). |
|
@simonmarty Yes, most likely. |
|
@simonmarty I think this should be merged as the current state is inconsistent: a default setup will give you a secrets store driver that is tolerant and an aws-provider that is not. That cannot reasonably be a good default? |
Issue #, if available:
Description of changes:
Adding default
tolerationto the daemonSet to tolerate anytaints.Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/
By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of your choice.