-
Notifications
You must be signed in to change notification settings - Fork 715
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Kubeadm should run kube-proxy under its' own identity #114
Comments
@liggitt @deads2k Does it sound like a good idea to create a new flag to kube-proxy ( It would also take the Optionally, we could set Does this sound good to you? |
I haven't looked at the kube-proxy arg handling in a very long time, but I'd expect it to take a |
InClusterConfig uses the kubernetes service vip which isn't setup til the kube-proxy runs. We could however use a service account token. |
Yes, @mikedanese @deads2k @liggitt are you in favor of a PR that adds a flag so kube-proxy reads the kube-proxy can't use the full inclusterconfig because of the chicken-and-egg situation, and we can't either add this functionality by default because it could break existing users. I could send a such PR next week if that sounds good, it should be pretty straightforward I guess |
I'd rather keep kube-proxy simple and make it the responsibility of the thing starting kube-proxy to build a kubeconfig for it. if you want to run it in a daemonset, that would mean injecting a kubeconfig with the ca/token/master address you want. you can reference the service account token and ca.crt from that kubeconfig if you like:
|
Ah, of course. I totally forgot the possibility to point to files in the kubeconfig, that's the best approach indeed. Thanks! What do you think about |
Maybe I misunderstand what you are suggesting. The kube-proxy isn't running at this point so there is no node port. |
I thought it was the kubelet that was opening the nodePort, I didn't ever check it was the proxy which it indeed is. I guess we bet everything on HA kubeconfig then ;) |
Work in progress here: kubernetes/kubernetes#40556 |
This is now fixed in kubernetes/kubernetes#40556, kube-proxy injects a ConfigMap with the kubeconfig file and runs in a separate ServiceAccount that has granted the So now it runs under its own identity, thanks for the pointers 👍 |
kubeadm runs kube-proxy under the kubelet's identity. It should run under its' own identity.
The text was updated successfully, but these errors were encountered: