Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Lift the need for explicit master IP + credentials #1

Open
opaugam opened this issue Apr 29, 2015 · 5 comments
Open

Lift the need for explicit master IP + credentials #1

opaugam opened this issue Apr 29, 2015 · 5 comments

Comments

@opaugam
Copy link

opaugam commented Apr 29, 2015

Not sure how this works but POST 10.0.0.2 over TLS does not let me in, meaning I can't do stuff in the cluster from within a pod (which sucks).

@satoshi75nakamoto
Copy link

@opaugam have you looked at: kubernetes/kubernetes#7101 yet?

When it lands, you'll be able to create a "my-pod-creator" service account, and use that identity to authenticate to the https endpoint.

@stphung
Copy link

stphung commented May 5, 2015

@opaugam would this be why an image I am using which depends on paugamo/pod is blocking on a curl call to the k8s RO service?

ps shows the following:

curl -f http://10.0.0.1/api/v1beta3/namespaces/default/pods/ochopod.default.hello-ochopod-2015-05-05-23-13-22-tvzdo

Eventually this leads to a timeout

@satoshi75nakamoto
Copy link

@stphung did you ever get this working correctly?

@stphung
Copy link

stphung commented Jun 4, 2015

@preillyme I didn't, the RO service isn't reachable from within a container from what I could tell which makes it difficult to implement the ochopod interfaces. We haven't tried looking around to see if there are any other alternatives on how we can bridge this gap yet.

@satoshi75nakamoto
Copy link

@stphung have you seen this issue: kubernetes/kubernetes#4567

Now that the "secrets" type has been merged, and we have namespaces, It doesn't make sense to give blanket readonly access to objects. So, it's been deprecated.

So, there's now a flag added to the master that disables its creation. If you need it we can tell you how to get it back, but we discourage new uses.

Once service-accounts lands, we can give people that need it a way to automatically generate policy and credentials for things in pods. So then we can delete kubernetes-ro altogether.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants