-
Notifications
You must be signed in to change notification settings - Fork 6.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
doesn't apply oidc parameters to kube-apiserver #7786
Comments
I am running in the same issue today. I rerun cluster.yml to apply the oidc settings to the control plane. I set the following group variables regarding oidc
I see that the values are added to /etc/kubernetes/kubeadm-config.yaml
But no oidc entry in the /etc/kubernetes/manifests/kube-apiserver.yaml |
I've noticed the same using the v2.16.0 docker image. Kubeadm config is generated, but whatever makes kubeadm generate the updated kube-apiserver manifest is not run when using Two options that work:
Related: #4736 |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close |
@k8s-triage-robot: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
it didnt work for me ... both scenarios |
if we enable oidc after the cluster is deployed and apply to cluster it is not changing kube-apiserver settings. |
I manually executed |
Environment:
Cloud provider or hardware configuration:
Hardware
OS (
printf "$(uname -srm)\n$(cat /etc/os-release)\n"
):Linux 4.15.0-147-generic x86_64
NAME="Ubuntu"
VERSION="18.04.5 LTS (Bionic Beaver)"
ID=ubuntu
ID_LIKE=debian
PRETTY_NAME="Ubuntu 18.04.5 LTS"
VERSION_ID="18.04"
HOME_URL="https://www.ubuntu.com/"
SUPPORT_URL="https://help.ubuntu.com/"
BUG_REPORT_URL="https://bugs.launchpad.net/ubuntu/"
PRIVACY_POLICY_URL="https://www.ubuntu.com/legal/terms-and-policies/privacy-policy"
VERSION_CODENAME=bionic
UBUNTU_CODENAME=bionic
Version of Ansible (
ansible --version
):ansible 2.9.22
Version of Python (
python --version
):Python 2.7.18
Kubespray version (commit) (
git rev-parse --short HEAD
):v2.14.1
Network plugin used:
Calico
Ansible doesn't apply defined in
kube_oidc_auth: true
kube_oidc_url: https://dex.domain.com
kube_oidc_client_id: kubernetes
kube_oidc_ca_file: "{{ kube_cert_dir }}/ca.pem"
kube_oidc_username_claim: sub
kube_oidc_username_prefix: "oidc:"
kube_oidc_groups_claim: "groups"
kube_oidc_groups_prefix: "oidc:"
to /etc/kubernetes/manifests/kube-apiserver.yaml
therefore kube-apiserver pod doesn't have these parameters
The text was updated successfully, but these errors were encountered: