-
Notifications
You must be signed in to change notification settings - Fork 31
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
failed to determine master #2
Comments
startup.sh only works if etcd is publicly available or available from containers. |
@wmark what does your cloud config look like? It does assume etcd is listening on the IP on docker0. |
Thank you for looking into this. It basically boils down to having etcd locked down using iptables to prevent malicious containers from messing with the cluster. To solve this issue you just need to expose etcd ports (from the host) to the container. Excerpt from the iptables rules for your interest:
|
I do consider one of the major hurdles to make stampede production ready is to address the security around etcd and fleet. Currently some things can be done to restrict access, but I think it's either too cumbersome to the user or not sufficient. You do bring up a good point. It's really not good for stampede to assume that etcd is available to the containers as that has security implications. I think I will change it such that etcd is only accessed from outside the containers in the host OS/namespace. @wmark Would that approach work better for you? |
Darren, thanks a lot for taking the time to analyze the issue and your suggestion. I believe that due to etcd-io/etcd#91 we can close the issue here. |
@wmark I encourage you to check out rancher.io. Rancher.io is a continuation of work that started with stampede, but now we have a company and a large amount of resources dedicated to it. |
Thanks Darren, I will definitely take a look. Coming with some years of experience with Linux and Gentoo, I am currently working on a fork of CoreOS which incorporates all the missing items (central logging for example; HW monitoring and reporting, authneticated and encrypted-by-default networking between nodes) and fixing what's not done right yet (software versions, in-place updates using overlays, security settings). It's to run my encrypted email service, but with the goal in mind making it a Gentoo/ChromeOS distribution in the end. |
Sounds really interesting, I'd love to see it. |
The text was updated successfully, but these errors were encountered: