In addition to Red Hat OpenShift service on AWS default admission plugins, dynamic admission can be implemented through webhook admission plugins that call webhook servers, to extend the functionality of the admission chain. Webhook servers are called over HTTP at defined endpoints.
There are two types of webhook admission plugins in Red Hat OpenShift service on AWS:
-
At the end of the admission process, the validating admission plugin can be used to make sure an object is configured properly, for example ensuring affinity labels are as expected. If the validation passes, Red Hat OpenShift service on AWS schedules the object as configured.
When an API request comes in, mutating or validating admission plugins use the list of external webhooks in the configuration and call them in parallel:
-
If all of the webhooks approve the request, the admission chain continues.
-
If any of the webhooks deny the request, the admission request is denied and the reason for doing so is based on the first denial.
-
If more than one webhook denies the admission request, only the first denial reason is returned to the user.
-
If an error is encountered when calling a webhook, the request is either denied or the webhook is ignored depending on the error policy set. If the error policy is set to Ignore
, the request is unconditionally accepted in the event of a failure. If the policy is set to Fail
, failed requests are denied. Using Ignore
can result in unpredictable behavior for all clients.
The following diagram illustrates the sequential admission chain process within which multiple webhook servers are called.
Figure 1. API admission chain with mutating and validating admission plugins
An example webhook admission plugin use case is where all pods must have a common set of labels. In this example, the mutating admission plugin can inject labels and the validating admission plugin can check that labels are as expected. Red Hat OpenShift service on AWS would subsequently schedule pods that include required labels and reject those that do not.
Some common webhook admission plugin use cases include:
|
The maximum default webhook timeout value in Red Hat OpenShift service on AWS is 13 seconds, and it cannot be changed.
|