Skip to content

dynamic kernel whitelist #1059

Answered by kevin-bates
bloomsa asked this question in Q&A
Mar 29, 2022 · 2 comments · 1 reply
Discussion options

You must be logged in to vote

Hi @bloomsa - thank you for opening this discussion. To get this behavior, you could simply remove the whitelist env altogether. By default, new (updated, and deleted) kernelspecs are detected as soon as the next request comes in for them (which I believe tends to be too frequent, but, in this case, is a good thing).

If you wanted to tie this to dynamic configuration you'd need to configure the whitelist via the configuration file which, in container worlds, is also not that helpful. Command-line and env-based values always override the file-based configurables and, therefore, are not privy to dynamic configuration (which is caveat #1).

Replies: 2 comments 1 reply

Comment options

You must be logged in to vote
1 reply
@bloomsa
Comment options

Answer selected by bloomsa
Comment options

You must be logged in to vote
0 replies
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
2 participants