-
Notifications
You must be signed in to change notification settings - Fork 4.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Kubernetes Auth Multiple Hosts instead of a single one (HA Control Plane) #5408
Comments
Hey @mitchellmaler ! Could you give me some more information here? I'm have some questions:
Hopefully those are coherent questions 😄 if you could let me know, I'd greatly appreciate it! |
|
+1 for this. This is essential if you plan to use Vault Kubernetes Auth with a production Kubernetes cluster. |
@mitchellmaler isn't this normally achieved via a service/LB in front of n nodes in the cluster? |
I currently am interested in this functionality as well. I can attempt implementing it my self if some one could give me a little direction on where I should start looking and working. |
While I understand the need for a HA control plane support, I believe that adding support for multiple hosts into Vault is not the way to solve the HA challenge. HA control plane requires having a load balancer in front of API server. Without a load balancer you will have to implement a client-side load balancing on each API server consumer and you will have to keep the list of hosts updated for each consumer (Vault, Kubernetes compoents and basically anything that uses Kubernetes API). I think the solution here is:
This doc describes options for HA topology. It's a good starting point, but details will depend on your setup/needs. @catsby with high degree of confidence I think that there is no action required from Vault's side and the issue can be resolved, but could you please do a sanity check (I'm new to Vault)? |
I agree with this. When I logged the issue it was for Rancher clusters which automatically did the control plane balancing without the need to put one in front but you couldn’t point vault to that. Now they have support for pass through support and also I could have created my own LB in front as well. If you agree we can go ahead and close this. |
I agree as well, thank you for the detailed write up @m1kola and thank you @mitchellmaler for following up! I'm going to close this for now. Cheers |
Is your feature request related to a problem? Please describe.
Would it be possible to provide more than one kubernetes host to the kubernetes auth host value? We currently run kubernetes with 3 master nodes and would like the auth to try to use the api on one of those which would direct to the master anyways.
Describe the solution you'd like
Allow providing more than one host in the hosts variable and the engine try each one before failing if the connection is refused or has issues.
Describe alternatives you've considered
A clear and concise description of any alternative solutions or features you've considered.
The alternative for me is to setup a load balancer just for vault in front of the api servers which we currently use rancher to manage our clusters, auth, and load balancing/proxying requests to the api servers. Currently, rancher does not support jwt passthrough so my option is to expose the api servers but lock it down to only rancher server and vault.
The text was updated successfully, but these errors were encountered: