-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
RBAC Authorization fails when deploying a fresh cluster on Kubernetes v1.8.0 #3551
Comments
I think the docs tell us what to do
Question is what is the node admission plugin ... |
To ensure requests from nodes are authorized, you can: If you use the |
This follows us down security challenge as well https://kubernetes.io/docs/admin/kubelet-tls-bootstrapping/. Which I am uncertain we are currently doing. It appears that is we get bootstrapping working the name is setup correctly. |
As @liggitt mentioned, the way to resolve it until a proper fix is to edit the
add the group binding to the subjects section, which should look like that:
|
I think we should create the bridging policy in kops 1.8, and aim to support the full NodeAuthorizer in kops 1.9. |
This is an interim measure until we fully support the NodeAuthorizer and dynamic kubelet bootstrapping. Issue kubernetes#3551
This is an interim measure until we fully support the NodeAuthorizer and dynamic kubelet bootstrapping. Issue kubernetes#3551
@KashifSaadat I do not think we are blocked on this now. Have you tested master? |
Hey @chrislovecnm, tested with Justin's interim fix in PR #3683 and this is working successfully now for a freshly built cluster. Will close this issue as the future work required is documented in the roadmap, thanks! :) |
$ kubectl set subject clusterrolebinding system:node --group=system:nodes |
@JinsYin LGTM |
Would it be possible to break the solution down in layman's terms? When I follow the advice of @etiennetremel above and edit the clusterrolebinding, I get an error that isn't very meaningful for me:
Running command above:
also did nothing. Nodes still can't join:
In the past (on 1.11) my cluster worked fine with permissive clusterrolebinding, but this doesn't seem to work anymore. |
Steps to recreate:
v1.8.0-alpha.1
(or building off master)--authorization rbac
)The API fails to start successfully and you can see logs such as follows:
This is now occurring due to the following change in Kubernetes v1.8: kubernetes/kubernetes#49638 (related documentation: https://kubernetes.io/docs/admin/authorization/node/#rbac-node-permissions)
I validated this by using my admin token to add the
system:nodes
Group back into thesystem:node
ClusterRoleBinding, which resolved these issues and built the cluster successfully.What do you suggest would be the appropriate way forward to fix this for kops?
Friendly ping @chrislovecnm , @liggitt :)
The text was updated successfully, but these errors were encountered: