-
Notifications
You must be signed in to change notification settings - Fork 255
Sometimes mic does not assign identity in time #279
Comments
@omerlh -Its not expected, specifically if have single identity in picture. How many identities are being handled in this scenario ? Typical issues seen are due to cloud operations being slow. At end of every cycle, MIC prints the stats. Can you please post those stats to verify which part of the operation has taken more than expected time ? Init container is a good approach. There are some customers who have retries in built into the code to retry for longer periods of time. We are making more enhancements in the upcoming version to handle these scenarios
|
That sounds good. I would expect this to be solved by the provider - e.g. either in NMI or in Azure AppAuthentication library itself. For some reason, I don't see the stats in the logs, but I'll look it up next time we'll see it. |
i experience the very same issue most of the time when several pods are started at once. |
@markusdresch I've a few questions -
The current releases process pod bursts serially which is the cause of delays. For the upcoming release, we have made enhancements to batch process burst jobs to reduce the delay. Cloud operations are typically time consuming. You can view the stats in the mic logs which will provide information about how long the cloud operations take. |
looking forward to the next release. any ETA? |
@markusdresch Thank you for the information. We are planning for a release around July end/early August as we wrap up the project items in https://github.com/Azure/aad-pod-identity/milestone/1. We are planning to release an RC version from the latest master at the end of this week. Will update this thread with the information on running those images when they are available. |
1.5-rc2 looks good so far. |
there's still the odd pod that does not get an identity on first try when creating multiple pods at once, but from what i've seen they are few and recover on first retry. i'm very happy with this version. update: most of the pods that still crashlooped simply started before MIC was ready, so it's all good. |
Thank you, @markusdresch . For checking the readiness you can rely on the contents of /healthz of the MIC & NMI pod. It will show “Active” on one of the MIC(the one which shows leader election) and on all NMI pods, when they are ready to take traffic. More details of how to do this(programmatic way) can be found in the e2e test here:
|
@markusdresch - Thank you for the update. Please let us know if 1.5 series (latest was 1.5.2) continues to work as you are expecting. @omerlh - are you still facing this issue with 1.5.2 ? |
@kkmsft looks good to me |
Thank you - @markusdresch |
With 1.5.2 and improvements on retrying token request calls, closing this issue. Please reopen if its still an issue. |
Describe the bug
I deployed an application that is using pod identity to access to Azure. Last night I noticed errors when the app tried to request access tokens:
I looked at mic logs and I noticed the following:
Look like mic took a bit more time to assign the identity - so I would like to ask:
--
Steps To Reproduce
Deploy AAD pod identity, and an app to consume it.
Expected behavior
Identity assigned before the pod starts.
AAD Pod Identity version
mcr.microsoft.com/k8s/aad-pod-identity/mic:1.3
Kubernetes version
1.12.7
Additional context
The text was updated successfully, but these errors were encountered: