You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In helm installation method, when installing karmada-controller-manager, we use a initContainer to wait for the ready status of karmada-apiserver, which prevents the karmada-controller-manager from CrashLoopBack. This feature is introduced in #5010.
In order to access host cluster kube-apiserver in initContainer, we mounted a service-account-token type Secret, because the deployment of karmada-controller-manager is defined automountServiceAccountToken: false. Unset automountServiceAccountToken is introduced in #2523.
However, in #5010, we deleted the Secret mentioned above when we finished installation. Actually, we still need this secret after installation finished, otherwise karmada-controller-manager can't restart for lack of the mounted secret.
What you expected to happen:
Now, we have two ways to resolve it:
Method one: after the installation is complete, the secret remains.
But I am not clear about is this reserved secret sensitive information? Is there any security issue?
Method two: no longer manually mount the Secret but directly set automountServiceAccountToken.
In #2523, we unset automountServiceAccountToken because we think karmada-controller-manager has no need to interact with host cluster, but now it seems that it needs to interact with the host cluster. So, maybe we can reset automountServiceAccountToken.
How to reproduce it (as minimally and precisely as possible):
install karmada by helm method (the latest version)
delete the pod of karmada-controller-manager
check whether the pod of karmada-controller-manager ready
Anything else we need to know?:
Environment:
Karmada version: latest
kubectl-karmada or karmadactl version (the result of kubectl-karmada version or karmadactl version): latest
Others:
The text was updated successfully, but these errors were encountered:
There is no essential difference between the two methods, so they are the same regarding security. so more simpler and easier to understand is the better.
What happened:
In helm installation method, when installing
karmada-controller-manager
, we use ainitContainer
to wait for the ready status ofkarmada-apiserver
, which prevents thekarmada-controller-manager
fromCrashLoopBack
. This feature is introduced in #5010.In order to access host cluster kube-apiserver in
initContainer
, we mounted aservice-account-token
typeSecret
, because the deployment ofkarmada-controller-manager
is definedautomountServiceAccountToken: false
. UnsetautomountServiceAccountToken
is introduced in #2523.However, in #5010, we deleted the
Secret
mentioned above when we finished installation. Actually, we still need this secret after installation finished, otherwisekarmada-controller-manager
can't restart for lack of the mounted secret.What you expected to happen:
Now, we have two ways to resolve it:
Secret
but directly setautomountServiceAccountToken
.In #2523, we unset
automountServiceAccountToken
because we thinkkarmada-controller-manager
has no need to interact with host cluster, but now it seems that it needs to interact with the host cluster. So, maybe we can resetautomountServiceAccountToken
.How to reproduce it (as minimally and precisely as possible):
helm
method (the latest version)karmada-controller-manager
karmada-controller-manager
readyAnything else we need to know?:
Environment:
kubectl-karmada version
orkarmadactl version
): latestThe text was updated successfully, but these errors were encountered: