-
Notifications
You must be signed in to change notification settings - Fork 321
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[EKS] [Fargate] [request]: fargate daemon set support #971
Comments
Hey @runningman84, You can track #701 for a logging solution for EKS/Fargate. Can you explain more on the IAM integration point and why you are using kube2iam? IAM roles for service accounts works today with EKS/Fargate. |
Yes IAM stuff can be solved using the native integration. But there is still software which runs an old sdk. I think there should be a general solution for daemon sets in fargate. |
FWIW; we would like daemon-sets in EKS Fargate for two main reasons:
This has the potential added advantage that the Datadog Daemonset in particular supports log exporting too (as well as container metrics and events etc), so removes our current blocker of log centralisation for compliance as an extra benefit. We looked at https://github.com/tumblr/k8s-sidecar-injector for example to auto-inject sidecars, but really, this is exactly the purpose of a daemonset for our use case, and sidecars have limited scope compared to daemonsets. |
Similar to @dalgibbard I ended up writing a mutating webhook that injects sidecars on fargate specifically - https://github.com/mziyabo/fargate-eks-sidecar-injector. |
Lack of this ability actually cripples AWS GuardDuty EKS Runtime Monitoring When this feature is enabled and you are using Fargate, GuardDuty shows that your EKS So basically it's even worse if GuardDuty would say to you that your EKS clusters are not covered in RuntimeMonitoring, because it gives you false belief that they are kubectl get daemonset aws-guardduty-agent -n amazon-guardduty -o yaml
...
spec:
affinity:
nodeAffinity:
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: kubernetes.io/os
operator: In
values:
- linux
- key: kubernetes.io/arch
operator: In
values:
- amd64
- arm64
- key: eks.amazonaws.com/compute-type
operator: NotIn
values:
- fargate
... Also beside GuardDuty runtime monitoring, it also stops us from using 3rd party tools to achieve this same, that run as a daemonset, for example - https://www.elastic.co/guide/en/fleet/current/running-on-kubernetes-standalone.html |
Community Note
Tell us about your request
Allow us to run daemon sets like kube2iam, fluentbit and others in a fargate env.
What do you want us to build?
Improve the scheduler to allow running whitelisted daemon sets on fargate nodes.
Which service(s) is this request for?
Fargate, EKS
Tell us about the problem you're trying to solve. What are you trying to do, and why is it hard?
Right it is very difficult to run fargate as a replacement for ec2 nodes because you do not have exporter logs, iam integration and so on...
Are you currently working around this issue?
Use fargate only for non ciritical tasks which do not need iam, logs or anything else...
The text was updated successfully, but these errors were encountered: