-
Notifications
You must be signed in to change notification settings - Fork 431
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Implement bastion host #175
Conversation
Hi @tahsinrahman. Thanks for your PR. I'm waiting for a kubernetes-sigs or kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/ok-to-test |
return errors.Wrapf(err, "failed to createorupdate bastion public ip for cluster %s", s.scope.Cluster.Name) | ||
} | ||
|
||
bastionNicSpec := &networkinterfaces.Spec{ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
can this be part of machine actuator itself, so we can define 3 different roles, node, controlplane and bastion. so we can specify this as part of cluster spec itself instead of hard coding values here
@@ -37,7 +39,7 @@ type Spec struct { | |||
StaticIPAddress string | |||
PublicLoadBalancerName string | |||
InternalLoadBalancerName string | |||
NatRule int |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
So bastion VM is just a flavour of created cluster, some users may not want additional vm. So please add support for both scenarios
@@ -120,6 +117,20 @@ func (s *Service) CreateOrUpdate(ctx context.Context, spec azure.Spec) error { | |||
} | |||
nicConfig.LoadBalancerBackendAddressPools = &backendAddressPools | |||
|
|||
if nicSpec.PublicIPName != "" { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
please reuse the current public load balancer and reuse the nat rule for bastion vm instead of control plane vm
@awesomenix so, |
Sorry i meant this should be part of machinelist example here https://github.com/kubernetes-sigs/cluster-api-provider-azure/blob/master/cmd/clusterctl/examples/azure/machines.yaml.template You can see we define controlplane and node roles, there should be a bastion role as well which you have defined in few places in this PR.
Could you please do a quick write up on how this will look for end user?
|
so, as far as i understand,
For private clusters,
|
@tahsinrahman -- please hold off on changing anything until I have the opportunity to review this. I should be able to tonight or by tomorrow afternoon at the latest. |
@tahsinrahman -- overall, this is a great start! I had some refactoring to do elsewhere in the repo, which has caused your branch to have some conflicts. Can you please rebase this and then I can give a thorough review? |
3faa68a
to
d1eb077
Compare
@tahsinrahman @justaugustus what is the status of this PR? Is it moving ahead? HA is kind of depending on fixing the networking rules, which this PR touches. |
d1eb077
to
c2b7417
Compare
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: tahsinrahman The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
@alexeldeib @justaugustus i've updated the pr. it now uses load balancer inbound nat rules to connect to bastion host. @awesomenix should bastion node be defined as machine? doesn't a machine represent a kubernetes node? |
8e07aef
to
6bacc04
Compare
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
@tahsinrahman: The following tests failed, say
Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
Rotten issues close after 30d of inactivity. Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
@tahsinrahman: PR needs rebase. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
@fejta-bot: Closed this PR. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Which issue(s) this PR fixes
Fixes #165
This change is