-
Notifications
You must be signed in to change notification settings - Fork 715
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cleanup external CA mode #1258
Comments
Also pertinent: #1276. |
@seh |
It's working well for my case, which is probably unusual: I run in "external etcd mode" and the faux "external front proxy mode," in that I create those keys and certificates myself and place them on the master machines; problems there were what motivated #807 and #918, both solved now. I had been creating all the certificates myself, avoiding the "certs" phase altogether. Now I'm taking advantage of kubeadm init's improvements and allowing it to generate the API server certificates. Doing so allows me to run my master machines in an auto-scaling group, rather than creating each one as a "pet" with an accompanying network interface with a predetermined IP address (and hence a predetermined node name). Since I don't need to know the IP address ahead of time to create the API server certificate myself, I can let my cloud environment create the network interface, query the assigned IPv4 DNS name at boot time, feed that into kubeadm init --node-name, and let kubeadm's "certs" phase use that node name in the API server certificate. On that note, a diversion: I've noticed that the kubelet now logs a message periodically about overriding the cloud provider-supplied hostname with the hostname specified via the |
@seh good to know the certs part is working, so I'm closing the issue For the kubelet part eventually let's move the discussion to a separated issue, even if at first sight this is more a kubelet/cloud provider issue than a kubeadm issue. |
@fabriziopandini: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/milestone clear |
While testing v1.13 we discovered a regression in certs phases for sparse CA that was fixed by kubernetes/kubernetes#71232
However, there is room for improving the current implementation as per comment kubernetes/kubernetes#71232 (review), but this requires a little bit of more thinking.
The text was updated successfully, but these errors were encountered: