Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Expose Tenancy field in AwsNodeTemplate API #4633

Open
randomdev1492 opened this issue Sep 14, 2023 · 2 comments · May be fixed by #6360
Open

Expose Tenancy field in AwsNodeTemplate API #4633

randomdev1492 opened this issue Sep 14, 2023 · 2 comments · May be fixed by #6360
Labels
feature New feature or request

Comments

@randomdev1492
Copy link

randomdev1492 commented Sep 14, 2023

Description

Exposing the tenancy field in the AwsNodeTemplate API will help allow AWS GovCloud customers and anyone else that requires an extra level of security use Karpenter without compromise.

What problem are you trying to solve?

For AWS customers trying to maintain IL5 compliance, Kubernetes clusters must use dedicated instances. Since Karpenter does not expose the tenancy field of instance configuration in the AwsNodeTemplate spec, it means that NodeTemplates have to be used. This causes a lot of friction when trying to run Karpenter as different userdata fields, and therefore different NodeTemplates have to be made based on the instance type being used.

How important is this feature to you?

Without the ability to set the tenancy field, we cannot take advantage of the dynamic node right-sizing features that Karpenter has built in, and we are forced to restrict everything down to a single instance type. Exposing this API field would allow any AWS GovCloud customers attempting to run an IL5 compliant cluster to use Karpenter to its full potential.

I am interested and willing to work on this issue if it helps to move this issue forward.

@randomdev1492 randomdev1492 added the feature New feature or request label Sep 14, 2023
@randomdev1492
Copy link
Author

I am interested and willing to work on this issue if it helps to move this feature forward

@priestjim
Copy link

I would like to bubble up this issue as it is critical for us to be able to complete adoption of Karpenter for PCI-DSS infrastructure.

@DingGGu DingGGu linked a pull request Jun 14, 2024 that will close this issue
3 tasks
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
feature New feature or request
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants