-
Notifications
You must be signed in to change notification settings - Fork 558
Clusters without public IPs #221
Comments
I'm also interested in this feature. Happy to test if needed. |
I think in order to do this, we would need to:
|
I'm interested in this feature as well and am able to test / contribute if needed. |
I'm also interested |
Especially for large companies that are using multiple SAAS applications this is an important feature so that they can encapsulate each of the SAAS applications in its one subnet. Thats why I think that would be a really important feature to add |
This is very interesting to me and several customers I am working with. |
I have at least 3 large customers with this need if they want to move production work onto an Acs-engine built cluster. would also prefer that its there when acs RP has custom vnet feature, hopefully soon. |
To the folks in this thread, this would be an easy change for someone to contribute and test, but, as far as I know, is not something we're likely to get to in the immediate future.
|
Really need this for customers in the financial sector looking to move to ACS. |
Same here - we are interested in the feature & we'd be willing to test / otherwise contribute. |
@bogdangrigg I gave some of the high level tasks in the post above. My post in #458 gives some further guidance. If you want to take this on, I can offer pointers along the way. |
@colemickens Will changing the current external LB in the azuredeploy.json to an internal LB work until this feature is implemented? |
I'm excited to see that K8s now supports Azure Internal Load Balancers. How soon before ACS-Engine incorporates via Thanks |
@dcieslak19973 those aren't even in a released version of Kubernetes. I suggest you look at the release schedule for 1.7 and then add 2-4 weeks for us to get it into ACS. |
Thanks! Just really excited for the feature |
This is also an important prerequisite for my use of ACS (medical sector). Unfortunately, kubernetes/kubernetes#43510 is not yet assigned to a milestone. |
Chiming in here. This is an important feature for the use case (ours) where we put an app gateway in front of the worker cluster in a docker swarm deployment. When using an app gateway there's not a good reason to have the backend pool traffic go over the public internet and doing so greatly complicates the deployment. |
Almost all public sector entities in the Azure US National Cloud environment would need/require this capability. |
I don't think this is an upstream issue @anhowe. The only work remaining here is in ACS-Engine. |
Marked as upstream, because doesn't kubernetes/kubernetes#43510 have to be assigned to a milestone? |
That PR is already merged, and if you click on the merge commit hash where the bot merged it in, you can see that it's already in the alpha 1.7 builds. As such, I'm going to remove the upstream label. |
To re-iterate, this would be a low-hanging fruit for someone from the community to pick up. In fact, I think agents are already connecting via the ILB... it's possible that the only thing necessary would be to plumb something from apimodel -> the LB resource in the ARM template part to exclude the public configuration and the public ip resource when the apimodel flag is enabled... In fact, someone could probably see what I'm doing in this PR (#479) and then emulate it to:
That should more or less be it. The PKI is already configured correctly for the ILB and the agents are already connecting through ILB (or master IP directly in case of single-master). And I'll reiterate, I'd be happy to provide pointers/guidance to anyone who wanted to pick this up. |
I've taken a look at this. Your guidance was spot on although I have a couple of questions. If the master.count is gt 1 an ILB is generated. I've opted to keep the existing LB that had a public IP and simply provision as in ILB which is what you recommended above (This is up for grabs on whether this is a right approach). In doing so I have the following challenges.
|
Is there any update on this? |
Would it be an issue if ACS Engine were to simply allow the user to specify their own DNS domain (contoso.local) in the input file? In this scenario:
This introduces dependencies on the customer's environment, so documentation would need to be added to inform the user that internal DNS entries will be required in advance for the k8s API and all master and agent nodes to work. The upcoming Private Domains feature in Azure DNS could potentially be leveraged for more automation. |
Is there any update on this? |
Is there any update on this?? We have several projects that needs to be internally accessed too. |
Hi, we're deploying a cluster in a large corporate and this will be very important. Any idea when this will be available? |
Until this is resolved, can I simply remove a public IP from a cluster after it's created? Will that work? |
@jackfrancis Thank you. Do you have an ETA on the title feature? We really need this. Alternatively, is there a way to alter a newly created cluster (no workload yet) such that it's completely isolated from the internet and only accessible via our VPN? |
@jackfrancis and @lachie83, I would also be interested in the executive summary mentioned above. Thanks in advance! |
@yfried We're spinning up resources on this right now and hope to have progress this month. |
What's the problem with removing the Public IP after the cluster is created? What are the dependencies? |
The problem with removing the public IP is that it is attached to the external load balancer and the Kubernetes API certificates are generated for that particular DNS name so you would not be able to pass the certificates authentication |
The certificate also contains some generic Is that the only side effect of removing the public load balancer? |
As a starting point, let's build out a configuration feature that does the following:
TODO is:
|
FWIW, for our use case a flag called |
For this to be successful, you also need to be able to reach Azure APIs to e.g. attach persistent volumes without reaching out over the public Internet to get to them. Considering you're sitting in the same data centers, this is not only reasonable but expected, but it's probably something that the Azure product team needs to solve, not that the acs-engine community can really help with. |
In some cases customers would like to use Azure Express Route without public IP addresses assigned. This issue tracks the need an popularity of this request.
The text was updated successfully, but these errors were encountered: