Skip to content

Commit

Permalink
Explain that file-based pods cannot use secrets.
Browse files Browse the repository at this point in the history
  • Loading branch information
erictune committed Jun 2, 2015
1 parent f2a6d63 commit bd8e7d8
Showing 1 changed file with 5 additions and 1 deletion.
6 changes: 5 additions & 1 deletion secrets.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,3 @@
# Secret Distribution

## Abstract

Expand Down Expand Up @@ -184,6 +183,11 @@ For now, we will not implement validations around these limits. Cluster operato
much node storage is allocated to secrets. It will be the operator's responsibility to ensure that
the allocated storage is sufficient for the workload scheduled onto a node.

For now, kubelets will only attach secrets to api-sourced pods, and not file- or http-sourced
ones. Doing so would:
- confuse the secrets admission controller in the case of mirror pods.
- create an apiserver-liveness dependency -- avoiding this dependency is a main reason to use non-api-source pods.

### Use-Case: Kubelet read of secrets for node

The use-case where the kubelet reads secrets has several additional requirements:
Expand Down

0 comments on commit bd8e7d8

Please sign in to comment.