-
Notifications
You must be signed in to change notification settings - Fork 588
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fully private CAPA clusters #3711
Comments
We have an issue where we wanted to re-think the networking and offer different topologies: #1484 A few other issues that are related:
|
/triage accepted |
@Skarlso @richardcase would I be correct that this relates to both managed and unmanaged VPCs? If so I know there's some current logic that requires a CAPA-managed VPC to have at least 1 public and 1 private subnet. I'm not sure what the context is here though is there a limitation elsewhere that requires this to be the case? (I'm guessing it's related to the management cluster being able to connect to the workload cluster but not sure if still valid). Is it worth opening an issue to cover changing this requirement to fit in with the issue? Edit: the |
Correct.
Precisely. CAPA needs to maintain connection and refresh kube config for access. But this could be done via a private connection as well. As long as CAPA is in the same network I guess. Also, CAPA when it's done creating the cluster (managed EKS), it needs to shut off the public endpoint of the cluster. I have no idea how that will work. But as long as CAPA is in the same network, it should be okay. The need for public subnet must be removed.
Sorry, I don't understand this sentence. Would you mind rephrasing it? |
Sorry, it'd been a long week 😅 What I mean is, should we have an issue to specifically cover removing the hardcoded requirement on having both public and private subnets. I imagine there's more needed than just removing the checks so would be good to collect that info somewhere.
This has reminded me, there also needs to be support for situation where the initial creation of public resources (subnets, NAT gateway) can be skipped entirely. Creating them during initial setup and then later removing them isn't going to work in strict environment where policies are enforced via SCPs. (We have customers with this requirement already) |
Ah gotcha. :D Yes, sure, we can track that separately. This ticket is meant to be something akin to an epic basically.
True. Sadly. :D That will be a lot of work. :D But , hmm.. maybe not, because NAT gateways are only created when using public networks so if we don't create those at all, we shouldn't create a nat gateway either, right? |
In theory, yes. I'll raise an issue for making the NAT gateway an optional resource for private network clusters and link back to here. |
Our long-standing open issue ( #1484 ) to re-think how we represent different network topologies could help with this. |
Also related to this: kubernetes-sigs/cluster-api#6520 |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/remove-lifecycle stale |
This issue is labeled with You can:
For more details on the triage process, see https://www.kubernetes.dev/docs/guide/issue-triage/ /remove-triage accepted |
/remove-lifecycle stale |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
/help |
@richardcase: GuidelinesPlease ensure that the issue body includes answers to the following questions:
For more details on the requirements of such an issue, please see here and ensure that they are met. If this request no longer meets these requirements, the label can be removed In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
/kind feature
Describe the solution you'd like
[A clear and concise description of what you want to happen.]
This is a catch-all issue for everything that needs to be done related to making private clusters a reality.
Anything else you would like to add:
[Miscellaneous information that will assist in solving the issue.]
Environment:
kubectl version
):/etc/os-release
):The text was updated successfully, but these errors were encountered: