-
Notifications
You must be signed in to change notification settings - Fork 1.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Document a guide to management cluster security #4139
Comments
/kind documentation Given the issue description seems to be referencing that an approach needs to be documented. Is the main issue around credential management? |
I'm hoping it's mostly we do some documentation about how namespaces are your security boundary in the management cluster and that's inherited by any consumer, but will be meeting with @enxebre and @elmiko on Friday to get a better understanding, as I'm admittedly not up to speed on how the autoscaler integration was done. |
happy to join the meeting if possible |
I think @detiber might want to weigh in on this conversation as well. IIUC the autodiscovery logic that he added to the autoscaler should cater towards this at least partially? |
i have a feeling the conversation this friday will be very high level, but i'm glad you brought up the autodiscovery stuff @JoelSpeed. i think you are correct that it could help for the multi-tenancy issue. |
/milestone Next |
/retitle Document a guide to management cluster security Follow up from today's call: @randomvariable to write a doc on management cluster security as a whole, what are the security boundaries, and what does it mean to deploy multiple clusters in a single namespace. @elmiko to contribute /assign |
added #4153 |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-contributor-experience at kubernetes/community. |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-contributor-experience at kubernetes/community. |
Rotten issues close after 30d of inactivity. Send feedback to sig-contributor-experience at kubernetes/community. |
@fejta-bot: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
What steps did you take and what happened:
In v1alpha4 the recommend model fo multi tenancy is single controller for providers #4074.
With this model it might be the case where scalable resources and so machines for different clusters live in the same namespace. In such scenario the autoscaler would be watching nodes for the targeted cluster but would watch scalable resources for not only that cluster.
What did you expect to happen:
We should re evaluate the recommended multi tenancy model and document any caveats and recommended namespace topology when using autoscaling.
Anything else you would like to add:
[Miscellaneous information that will assist in solving the issue.]
Environment:
kubectl version
):/etc/os-release
):/kind bug
[One or more /area label. See https://github.com/kubernetes-sigs/cluster-api/labels?q=area for the list of labels]
The text was updated successfully, but these errors were encountered: