-
Notifications
You must be signed in to change notification settings - Fork 318
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Enable PodTolerationRestriction admission in AKS #1719
Comments
@Azure/aks-pm issue needs labels |
That taint is added to avoid workloads to inadvertently land on those pools that can cause disruptions so we require an explicit toleration to the workloads that can go there. Adding your ask for PodTolerationRestriction to the backlog |
Hi, |
I am currently deploying the DaemonSet with nodeSelector and kubectl inside container which does untaints for us. So when the new spot instance appears it also gets immediately untained. I'd rather do some checkbox for disabling that :) |
@slenky could you share how you untaint the node ? We are trying the same, but for an AKS cluster with just spot instances (default nodepool scaled to 0, spot nodepool scales to 0 at night and 1 in the morning) |
We are having a small system nodes always running so no problems with that. Not sure, but will that work if you set the Kubernetes API host to 10.0.0.1 inside that pod? daemonset.yaml
configmap.yaml
rbac.yaml
|
This would be very useful outside of spot pools. (and/or PodNodeSelector) |
Thank you for the feature request. I'm closing this issue as this feature has shipped and it hasn't had activity for 7 days. |
I'd like to deploy Kubeflow resources to AKS spot instances but Azure adds spot nodeTaints by default.
I need to either remove that taint from all spot nodes or use PodTolerationRestriction in the kubeflow namespaces.
The text was updated successfully, but these errors were encountered: