-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
gce: Add support for clusters without DNS #14769
Conversation
/retest |
TargetPool: targetPool, | ||
IPAddress: ipAddress, | ||
IPProtocol: "TCP", | ||
}) | ||
if b.Cluster.UsesNoneDNS() { | ||
c.AddTask(&gcetasks.ForwardingRule{ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We may be able to lock this down e.g. only to the nodes... We/I can try that separately though!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
My idea is that, we could add another internal LB for this purpose, making it secure. Though, that would diverge from the original concept and a refactor would be needed to return the IP(s) for kops-controller separately from API ones.
My goal in this PR was to get it supported as simple as possible. To the very least, this gives us a chance to add some tests and see how the output changes later.
}) | ||
if b.Cluster.UsesNoneDNS() { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Do we need this? This would be for e.g. humans running kubectl
?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Not quite pretty, but with Public LB, the nodes need access to it and this was the best idea at the time except for allowing all traffic.
break | ||
} | ||
} | ||
if bootConfig.APIServerIP != "" { | ||
case kops.CloudProviderGCE: | ||
// Use any IP address that is found (including public ones) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nit (for a future PR): We probably should just have nodeup accept a list of IPs, probably easier than choosing!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I thought about this a little. Would be nice to do the choosing on nodeup side. For sure it would be better equipped to find the best bootstrap address for itself.
This looks good. One quibble about whether we need to open the ports on the Load Balancers or can restrict it a bit more, but we can likely merge this and then try locking it down. /approve /hold in case you want to address why we need to open the kops-controller port to the kubernetesAPIAccessRange - I don't understand that, I don't think it necessarily includes the nodes! But if not, no worries, we can look at this as part of follow-on |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: justinsb The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Thanks for the review @justinsb. I also agree about the firewall rule for kops-controller. Hopefully we can find a solution there and implement it in a separate PR. |
Quick version of
--dns=none
for GCE.Refs #14859