-
Notifications
You must be signed in to change notification settings - Fork 33
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
How to configure spire-agent on cluster-A to talk to spire-server on root-spire-server #371
Comments
Note: Perhaps this is more suitable as a discussion instead of issue, but I don't see that tab. |
It is possible to configure multiple instances of the spire helm chart to properly support a nested configuration. But, we're getting really close to releasing 0.21.0. It will contain a new chart, spire-nested that will allow for easy deployment of nested spire configurations directly. It should be out in the next few days. There is initial documentation for it in this PR: The current rendered documentation for that documentation PR can be found here: |
Thank you for the link 😊 Will stay tuned for the update. Can you briefly explain why it needs to be such a complex architecture? Conceptually, why does the root cluster need multiple servers and agents? |
lots of little reasons. its likely at some point to want to have workloads running on the cluster that the root-spire server is running in also bound to spire setup. the internal-spire server in the root k8s cluster does that part. You also may want to isolate the real root ca from the internet/intranet. In this setup, the root-spire instance only is a root ca server and only accessible from within the root k8s cluster for maximum security. If the external-server needs to be rekeyed or scaled up, its much easier to do without changing the main root server in this arrangement. |
Than you for clarifying! I think the reasons makes sense. I would probably think that these reasons are a bit too advanced for our use case - We value getting up an running quickly with something that is production ready and okay on security, not necessarily needing maximum security. But if this new helm chart delivers both better security and more convenience, then that sounds like worth waiting for. |
I would like a setup as follows:
I have many different Kubernetes clusters that all should use the same trust domain. I have configured spire-server (and in fact the entire spire stack) on a server, let's call it
root-spire-server
. I have also configured spire-agent (in fact all spire stack except spire-server and spire-oidc-provider) on another Kubernetes cluster, let's call itcluster-A
, and I would now like the agent to talk to the server, as depicted here.root-spire-server
happens to run in a Kubernetes cluster with one node that is dedicated to running Spire. I have an ingress for the oidc-provider that works correctly, with HTTPS certificates provisioned by cert-manager. I also have an ingress for spire-server with an HTTPS certificate by cert-manager.I am getting this error on the agent:
(trust domain
domain.org
,root-spire-server
hostname isspire.my.domain.org
- of course here using an imaginary domain, but my actual domains are pretty similar).I think there are a couple of things lacking in my understanding:
cluster-A
. One purely for talking toroot-spire-server
and one for the workload API on the cluster itself.The text was updated successfully, but these errors were encountered: