-
Notifications
You must be signed in to change notification settings - Fork 949
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Baremetal http issue on openebs-operator #1184
Baremetal http issue on openebs-operator #1184
Comments
The error is caused by the use of "InClusterConfig" to access the kubenetes api server which will default to use https. Similar to the DNS plugin listed above, there has to be an option to specify : insecure-skip-tls-verify that will result in setting the Config.Insecure to true.
|
Tried with various ENV options to set the scheme to Currently checking with sig-api-machinery if this can be done via a config push than a code change. |
@theonlydoo, I think I have got the issue reproduced using minikube. I am using the following test yaml to check if the fix is going to work. Can you please apply the following yaml in your setup and share the output. Please replace 10.128.0.12 with your kubernetes server IP address and 8080 with the insecure port.
Here is the information/output of running the above test file in my minikube (using localkube) setup where apiserver is listening only on insecure port 8080:
The API server is available at
In this minikube setup, I am running the following test.yaml:
Note the way IP address and port are specified.
The above command launches a pod that compiles client-go code and fetches the list of pods and pvs. It may take 1/2 mins before the output starts to appear:
If I don't specify the master address as below:
I see the following in the logs:
|
maya v0.5.0 has approved a checkin to fix this issue. |
openebs-archive/external-storage#31 fixes indeed |
1. Why is this change necessary ? - To support volume provisioning and discovering maya-apiserver on insecure/Non SSL connections to kubernetes master. 2. How does this change address the issue ? - Add flags `--master` and `--kubeconfig`, Either of these can be used to communicate with the kubernetes-master. 3. How to verify this change ? - Set-up your kubernetes cluster to allow insecure/Non SSL connections ** This is added only for testing purpose, please use secure connections otherwise. ** - Please verify whether your setup allows the insecure connections.[See](http://yasassriratnayake.blogspot.in/2017/05/how-to-allow-insecurenon-ssl.html) 4. What side effects does this change have ? - Flags added is optional (either of `master` and `kubeconfig` can be used to connect with kubernetes master) and can be used as per requirement - These flags can be passed in yaml file with the following fields ``` image: <openebs-k8s-provisioner-image> command: ["openebs-provisioner"] args: - -master=<master's-ip>:8080 ``` 5. Other details fix: openebs/openebs#1184
1. Why is this change necessary ? - To provide support for insecure/non SSL connections on kubernetes via k8s environment variables 2. How does this change address the issue ? - Retrieve env variables directly from k8s env instead of getting as flags 3. How to verify this change ? - Test the latest image with kubernetes cluster allowing insecure/Non SSL connections. 4. What side effects does this change have ? - This commit adds a file env.go that has all the env variables defined and can be used in provisioner. 5. Other details improvement: openebs-archive#30 fix: openebs/openebs#1184
1. Why is this change necessary ? - To support volume provisioning and discovering maya-apiserver on insecure/Non SSL connections to kubernetes master. 2. How does this change address the issue ? - Add flags `--master` and `--kubeconfig`, Either of these can be used to communicate with the kubernetes-master. 3. How to verify this change ? - Set-up your kubernetes cluster to allow insecure/Non SSL connections ** This is added only for testing purpose, please use secure connections otherwise. ** - Please verify whether your setup allows the insecure connections.[See](http://yasassriratnayake.blogspot.in/2017/05/how-to-allow-insecurenon-ssl.html) 4. What side effects does this change have ? - Flags added is optional (either of `master` and `kubeconfig` can be used to connect with kubernetes master) and can be used as per requirement - These flags can be passed in yaml file with the following fields ``` image: <openebs-k8s-provisioner-image> command: ["openebs-provisioner"] args: - -master=<master's-ip>:8080 ``` 5. Other details fix: openebs/openebs#1184
1. Why is this change necessary ? - To provide support for insecure/non SSL connections on kubernetes via k8s environment variables 2. How does this change address the issue ? - Retrieve env variables directly from k8s env instead of getting as flags 3. How to verify this change ? - Test the latest image with kubernetes cluster allowing insecure/Non SSL connections. 4. What side effects does this change have ? - This commit adds a file env.go that has all the env variables defined and can be used in provisioner. 5. Other details improvement: openebs-archive/external-storage#30 fix: openebs/openebs#1184
Bug report
Bug description
openebs-operator can't reach k8s' api server because it tries to use a
https
scheme instead of thehttp
defined clusterwide.What you expected to happen:
maya doesn't have this issue, so I expected to be the same on operator.
Bug Reproduction
Setup an up to date (
1.9.1
) k8s bare metal cluster. Use the firewall security model described here : https://kubernetes.io/docs/getting-started-guides/scratch/#security-modelsRun the pod.
Else
Slack related archive begins here : https://openebs-community.slack.com/archives/C3NPGQ6G3/p1517394852000413 and ends here : https://openebs-community.slack.com/archives/C3NPGQ6G3/p1517405899000094
The text was updated successfully, but these errors were encountered: