-
Notifications
You must be signed in to change notification settings - Fork 15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Document the following features are not supported #234
Comments
In a public doc we should just say it isn't supported. The rest of this comment was for our internal knowledge. |
Explanation: STIG - on the roadmap Now thos that do not have a date here is a descending list in priority: |
Hey @sergeymirantis - why is gMSA not applicable if Windows support is applicable? Also could you please share the data that you used to make a case for prioritizing Multus over Cilium. |
@vikramhh - I think that by the time we implement Windows - we should look into dMSA which solves many security concerns of gMSA. |
@sergeymirantis - migrating gMSA accounts to dMSA is not supported. What would our migration story be like if we decide to not support gMSA? Could you please share links to the blunt requests/mentions so that the MKE team can follow-up with the request originators and do a more thorough ordering than just based on mentions alone. Were you able to connect with someone deploying Multus on MKE3.x? |
@vikramhh - yes I agree there is no migration path for now. This can present a certain limitation. However, gMSA presents some serious security concerns in AD heavy environments. I personally do not really know if doing a full lift-and-shift to dMSA is not a worthwhile investment. As for the ticket numbers - I will send them to you in email. I do not think we need to overload this thread here :) |
@sergeymirantis - security concerns around gMSA have been known for years, however we still had customers deploy gMSA within the last 12 months or so. Given you determined that we would not be pursuing gMSA, I was looking for data points around which we decided that these security concerns overweight maintaining support for a feature that customers are actively using while being well aware of the security risks. As for Multus, my query was more than just the ticket numbers. Mentioning what customers are using it would help anyone perusing this thread - however if for some reason even that question must be answered in email, I am fine with that. |
Sorry @vikramhh I am lost abit. So are you trying to say we need to keep gMSA support and prioritize it? Multus main requestor is SocGen, Telstra and Nordea. Again, Multus is "already" in MKE3.x and that is why we need to prioritize it over Cilium, which is not in MKE3.x Please let me know what other details you want to get. |
@sergeymirantis - so far as I can tell, dMSA was introduced in WS 2025. gMSA for containers has been around for 5 years+, there is nothing analogous for dMSA yet. At least two customers are using gMSA within a year of adding support for it. There is no migration path from gMSA to dMSA. Yet we are proposing to drop support for gMSA. OTOH, Multus, a feature which has been around in MKE3 for at least as long as gMSA, and has no user so far as I can tell, is being fast-tracked. I am finding it hard to reconcile the above two. If SocGen, Telstra and Nordea are the main requesters for Multus, why are they not using it on MKE3? No issue for Multus have ever been reported - which gives credence to the fact that no one is using it. Knowing why no one is using an existing feature would be important to know if we plan to do it for MKE4 as well - and it would be even more important to know why that is so if MOSK would use it(at least we could avoid making the shortcoming due to which it is not getting used in mke3). It could be argued that this information should be factored in while scheduling it for MKE4. I am lacking such details and trying to get those from you. |
@ryan and @sergeymirantis, I think the solution that is best and easiest to maintain is to build on what we already have in the Features summary at the bottom of the page, where we list MKE 3.x features that we are working to integrate in upcoming releases. Perhaps, though, instead of building another list at the bottom for features that will not be supported, instead we develop a second Features page that specifically addresses features that are not yet in the product or that will never be in the product. Features summary (new top-level page, describes the section, etc.)
|
The following features are not supported. I provide the content here, it's up to @Mirantis/mke-docs and @sergeymirantis to decide how to present it. Please reach out to SME if you need more details, otherwise, reach out to me.
"config etcd storage quota", "cleanse etcd of kubernetes events", "apply etcd defragmentation", "etcd alarms response" are not supportedThe text was updated successfully, but these errors were encountered: