-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
etcd3 with enableEtcdTLS and enableTLSAuth failing on AWS #6024
Comments
The root cause of this issue appears to be a breaking change in etcd v3.2 around TLS. Snippets from etcd security documentation:
Above is the result of etcd-io/etcd#7767. Also:
kops certficates do not have IP addresses in the SANs. I believe this is due to the creation of instances from autoscaling groups and you cannot predict the IP address. The SAN for the cluster is created in the pki model and has the following SANS:
Unless my understanding is wrong, this means that kops doesn't currently support etcd v3.2.0 and higher with multi-master nodes as etcd is unable to authenticate with peers. |
This works around the (very unusual) etcd changes for validation of peer certificates by DNS lookup, which were introduced in etcd 3.2. Issue kubernetes#6024
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Rotten issues close after 30d of inactivity. Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
@fejta-bot: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
TL;DR: etcd3 used with
enableEtcdTLS
andenableTLSAuth
is failing TLS auth likely due to wrong reverse DNS.Is this a supported feature? Am I doing something wrong? Am I missing something?
Template:
1. What
kops
version are you running? The commandkops version
, will displaythis information.
1.10.0
2. What Kubernetes version are you running?
kubectl version
will print theversion if a cluster is running or provide the Kubernetes version specified as
a
kops
flag.Trying to build a 1.10.6 cluster
3. What cloud provider are you using?
AWS in the
us-east-1
region4. What commands did you run? What is the simplest way to reproduce this issue?
kops create cluster -f mycluster.yaml
which is created usingkops toolbox template
. The relevant parts:enableEtcdTLS
andenableTLSAuth
both set to true5. What happened after the commands executed?
Cluster was created, but failed to fully validate due to etcd TLS issues caused by reverse DNS resolving.
In the
etcd.log
I can see many errors such as:Looks like reverse DNS for that domain is not working properly:
First lines of
etcd.log
:6. What did you expect to happen?
Certs to be created by kops, added to the nodes and everything to work.
7. Please provide your cluster manifest.
8. Please run the commands with most verbose logging by adding the
-v 10
flag.Paste the logs into this report, or in a gist and provide the gist link here.
N/A
9. Anything else do we need to know?
I tried to edit the DHCP options by setting the domain but that did not seem to help.
Some relevant etcd issues: etcd-io/etcd#8268 mostly, but etcd-io/etcd#9575 too
The text was updated successfully, but these errors were encountered: