-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Are kops clusters subject to Kubernetes known issue: etcd client balancer with secure endpoints #7816
Comments
Using
we seems to be able to upgrade to
|
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Rotten issues close after 30d of inactivity. Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
@fejta-bot: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Kubernetes documentation lists a "known issue": etcd client balancer with secure endpoints
This issue is reported at kubernetes/kubernetes#83028 and kubernetes/kubernetes#72102 and a workaround (using wildcard SANs in
etcd
TLS certificates) is mentioned at kubernetes/kubernetes#72102 (comment). The comments suggest Kubernetes will not have a fix for this until Kubernetes v1.16.3, and that all versions of Kubernetes usingetcd3
with TLS certificates (which iskops
1.12 and later, right?) are affected.Are clusters deployed by
kops
affected by this issue, or haskops
installed a workaround or lateretcd3
version?Please document what is and is not affected and any suggested mitigations.
The text was updated successfully, but these errors were encountered: