[ https://issues.apache.org/jira/browse/FLINK-29131?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17605379#comment-17605379 ]
Dylan Meissner commented on FLINK-29131: ---------------------------------------- I've abandoned my original approach due to the invasiveness of host networking on the operator pod. Referencing [the Helm chart for cert-manager|[https://github.com/cert-manager/cert-manager/blob/release-1.9/deploy/charts/cert-manager/values.yaml#L342-L351]] it seems a good approach is to separate the webhook container into its own pod. I did successfully after specifying `webhook: \{create: false}` and separately creating the webhook as its own deployment. Applying this strategy to Helm chart is a large undertaking may warrant a FLIP. > Kubernetes operator webhook can use hostPort > -------------------------------------------- > > Key: FLINK-29131 > URL: https://issues.apache.org/jira/browse/FLINK-29131 > Project: Flink > Issue Type: Improvement > Components: Kubernetes Operator > Affects Versions: kubernetes-operator-1.1.0 > Reporter: Dylan Meissner > Assignee: Dylan Meissner > Priority: Major > Fix For: kubernetes-operator-1.2.0 > > > When running Flink operator on EKS cluster with Calico networking the > control-plane (managed by AWS) cannot reach the webhook. Requests to create > Flink resources fail with {_}Address is not allowed{_}. > When the webhook listens on hostPort the requests to create Flink resources > are successful. However, a pod security policy is generally required to allow > webhook to listen on such ports. > To support this scenario with the Helm chart make changes so that we can > * Specify a hostPort value for the webhook > * Name the port that the webhook listens on > * Use the named port in the webhook service > * Add a "use" pod security policy verb to cluster role -- This message was sent by Atlassian Jira (v8.20.10#820010)