-
Notifications
You must be signed in to change notification settings - Fork 13
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
TLS certs for handlers we run #78
Comments
In my testbed, I'm outsourcing this to cert-manager, as detailed in the README.md. If you're getting ACME support maybe you could explore caddy server? |
[ Quoting <notifications@github.com> in "Re: [virtual-kubelet/systemk] TLS c..." ]
In my testbed, I'm outsourcing this to cert-manager, as detailed in the
README.md.
Might be worth looking how that's done. Ideally I want that thing *also* to be run as a
unit, which may or may not be managed by systemk.
(I.e. systems bootstraps, see cert-manager, get's certs, enabled TLS on handlers)
If you're getting ACME support maybe you could explore caddy server?
If feel this is the more generic way solving this, i.e. even certmanager may support this
(no idea if it does)
/Miek
…--
Miek Gieben
|
I don't think you can run cert-manager without an API server given it requires CRDs to function - cert-manager uses Kubernetes object store as its storage backend. Anyways, it seems you're hinting at first adding support for static pods #27. |
But you may be missing something here. Yes, you can use your own CA for signing systemk HTTPS endpoint but it must be validated by the API server (there's a flag for client CA certificate), meaning that CA must be known to the API server before systemk registers as a Node. Also, and unless the CA is shared w/ Kubernetes, you can't use said CA to bootstrap TLS for authenticating systemk as a Node against the API server. If I'm not missing anything, that seems like a lot of work for very little gain. |
yes i'm looking to share the root-ca with k8s. I.e. I have step-ca running somewhere providing this. The problem is I don't like 'running somewhere' so it needs to run under systemk. Now for bootstrapping it may not run under systemk, but once that's done everything should be running in-cluster and manageable via kubectl |
OK so your goal is to have systemk setup the CA and then bring up the API server with that CA? If yes, that's totally doable. The problem later is how to join other systemk instances, maybe even kubelets, as the CA lives only on one machine. |
OK so your goal is to have systemk setup the CA and then bring up the API
server with that CA? If yes, that's totally doable.
yep!
|
A suggestion is for this to be implemented as an opt-in vs opt-out feature. |
For the log handler we have the tls-cert and tls-key flags that read a cert. It would be nice(r) if we just embed a ACME client that gets these certs from a CA.
Alternatively this could be outsourced, but then we would need to periodically re-read the key and cert from disk.
I think at this point I prefer ACME as I need to run my own CA anyhow.
The text was updated successfully, but these errors were encountered: