[ https://issues.apache.org/jira/browse/FLINK-29131?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17607131#comment-17607131 ]
Dylan Meissner commented on FLINK-29131: ---------------------------------------- This can be in the same Helm chart, but as a separate deployment alongside the Operator. It also has a distinct ServiceAccount and ClusterRole from the Operator, as it only requires privileges to use the PodSecurityPolicy. > Kubernetes operator webhook can use hostPort > -------------------------------------------- > > Key: FLINK-29131 > URL: https://issues.apache.org/jira/browse/FLINK-29131 > Project: Flink > Issue Type: Improvement > Components: Kubernetes Operator > Affects Versions: kubernetes-operator-1.1.0 > Reporter: Dylan Meissner > Assignee: Dylan Meissner > Priority: Major > > When running Flink operator on EKS cluster with Calico networking the > control-plane (managed by AWS) cannot reach the webhook. Requests to create > Flink resources fail with {_}Address is not allowed{_}. > When the webhook listens on hostPort the requests to create Flink resources > are successful. However, a pod security policy is generally required to allow > webhook to listen on such ports. > To support this scenario with the Helm chart make changes so that we can > * Specify a hostPort value for the webhook > * Name the port that the webhook listens on > * Use the named port in the webhook service > * Add a "use" pod security policy verb to cluster role -- This message was sent by Atlassian Jira (v8.20.10#820010)