Greetings,
I've deployed this project to AWS EKS v1.21, and noticed that the webhook pod is issuing valid AdmissionReviews, it seems that have field allowed: true, but the API server doesn't accept them. So I've looked in Cloudwatch Logs and found the following error messages:
W1207 11:32:02.918031 11 dispatcher.go:268] Failed to set admission audit annotation namespace-node-affinity.namespace-node-affinity.svc/namespace-node-affinity.idgenchev.github.com/applied-patch to [
{
"op": "add",
"path": "/spec/affinity",
"value": {
"nodeAffinity": {
"requiredDuringSchedulingIgnoredDuringExecution": {
"nodeSelectorTerms": [
{
"matchExpressions": [
{
"key": "dedicated",
"operator": "Equal"
}
]
}
]
}
}
}
}
,
{
"op": "add",
"path": "/spec/tolerations/-",
"value": {
"key": "dedicated",
"operator": "Equal",
"value": "critical",
"effect": "NoSchedule"
}
}
] for mutating webhook namespace-node-affinity.namespace-node-affinity.svc: annotation key has invalid format, the right format is a DNS subdomain prefix and '/' and key name. (e.g. 'podsecuritypolicy.admission.k8s.io/admit-policy')
EDIT: and the new pods do not appear in cluster, so with this hook deployed, if it tries to apply configuration, new pod definition will be rejected and not created in cluster, so this is a blocking bug, which stops us from using this useful piece of software.