-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Lift the need for explicit master IP + credentials #1
Comments
@opaugam have you looked at: kubernetes/kubernetes#7101 yet? When it lands, you'll be able to create a "my-pod-creator" service account, and use that identity to authenticate to the https endpoint. |
@opaugam would this be why an image I am using which depends on paugamo/pod is blocking on a curl call to the k8s RO service? ps shows the following:
Eventually this leads to a timeout |
@stphung did you ever get this working correctly? |
@preillyme I didn't, the RO service isn't reachable from within a container from what I could tell which makes it difficult to implement the ochopod interfaces. We haven't tried looking around to see if there are any other alternatives on how we can bridge this gap yet. |
@stphung have you seen this issue: kubernetes/kubernetes#4567 Now that the "secrets" type has been merged, and we have namespaces, It doesn't make sense to give blanket readonly access to objects. So, it's been deprecated. So, there's now a flag added to the master that disables its creation. If you need it we can tell you how to get it back, but we discourage new uses. Once service-accounts lands, we can give people that need it a way to automatically generate policy and credentials for things in pods. So then we can delete kubernetes-ro altogether. |
Not sure how this works but POST 10.0.0.2 over TLS does not let me in, meaning I can't do stuff in the cluster from within a pod (which sucks).
The text was updated successfully, but these errors were encountered: