-
Notifications
You must be signed in to change notification settings - Fork 715
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Adding Kubelet Serving Certificate using serverTLSBootstrap: true #1635
Comments
/triage support hi, this doesn't look like a kubeadm problem, per se. have you looked at the kubelet logs for any errors? |
i think the CSR is not being issued because the certificate is still being self-signed:
try passing those settings too. |
Thanks for the comment. I will check this. |
The issue was --node-ip not getting added to two of the masters. As it is not possible to add via KubeletConfiguration, I added it using sed. Closing the issue. |
@munai-das I'm trying to do the same thing - can you share your changes to kapprovers? |
I have internally refactored the kapprovers piece. I will ask the concerned person in the office and open source it. |
Thanks, but I sorted it with https://github.com/kontena/kubelet-rubber-stamp
;)
Cheers!
D
On 9 July 2019 at 19:08:38, Munai Das Udasin ([email protected]) wrote:
I have internally refactored the kapprovers piece. I will ask the concerned
person in the office and open source it.
—
You are receiving this because you commented.
Reply to this email directly, view it on GitHub
<#1635?email_source=notifications&email_token=AALUHTWUMJ5KT6FX4UCED7LP6Q2PLA5CNFSM4H3BKW4KYY3PNVWWK3TUL52HS4DFVREXG43VMVBW63LNMVXHJKTDN5WW2ZLOORPWSZGODZPKGPQ#issuecomment-509518654>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/AALUHTWEY6PFNXW3HNVIBILP6Q2PLANCNFSM4H3BKW4A>
.
|
What keywords did you search in kubeadm issues before filing this one?
Versions
kubeadm version (use
kubeadm version
): v1beta1Environment:
kubectl version
): kubernetes 1.14.1uname -a
): 3.10.0-957.21.3.el7.x86_64Container-Runtime: docker://18.6.2
What happened?
Added the below to make Kubelet Serving Certificate work.
As a part of
KubeletConfiguration
in master0(3 master setup)&
kubelet-certificate-authority: "/etc/kubernetes/pki/ca.crt"
to kube-apiserverAdditionally, I added below to
nodeRegistration
of worker JoinConfigurationMoreover, I also made sure that I added
-node-ip
to all my kubelets.(Refering https://kubernetes.io/docs/setup/production-environment/tools/kubeadm/troubleshooting-kubeadm/#non-public-ip-used-for-containers)
I forked and modified CoreOS’ kapprovers to auto-approve CSR requests by kubelets.
What you expected to happen?
Kubelet Serving Certificates to be issued by CSR API.
kubectl logs stopped working with the error
Error from server: Get https://XXXX:10250/containerLogs/: dial tcp XXXX:10250: connect: no route to host
How to reproduce it (as minimally and precisely as possible)?
Add the flags as described in What Happened above.
Anything else we need to know?
No.
The text was updated successfully, but these errors were encountered: