-
Notifications
You must be signed in to change notification settings - Fork 39.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
kubelet and kube-proxy fail to reload certificates when they are updated #46287
Comments
/sig cluster-lifecycle |
Experiencing the same issue.
|
Experiencing the same issue, Just tried to replace the certificates with new one.
|
My work around:
I was using \ to have multi lines, you can even use your oneline at terminal for fast verification.
|
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Rotten issues close after 30d of inactivity. Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
/reopen |
@george-angel: you can't re-open an issue/PR unless you authored it or you are assigned to it. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Can someone please re-open this issue? Its quiet a significant one for us. We currently need trello cards with due time set a year ahead with a reminder to restart kube-proxy. |
Ping |
/reopen |
@dims: Reopened this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Is this a duplicate of #4672 ? Or possibly a subset (it calls out kubelet / kube-proxy specifically). |
It can be considered a subset, depending on how #4672 unfolds, currently its very broad. |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
/remove-lifecycle stale |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
/remove-lifecycle stale |
Semi related, I'm also interested in seeing if either this mechanism or direct integration with spire is possible for the certs. |
Gotcha! Well I don't know of anyone right this moment that has the bandwidth/priority to take this one on (thus why it's been continually going stale), but if you think you might have some time to spare I would encourage you to not worry about being a kubelet or kube-proxy expert. Reach out to the community (Slack, Zooms) and let them know you're trying to learn how to get this one fixed: I expect you'll find the community can provide some level of assistance (even if they themselves might not have the bandwidth/priority to take the whole thing on). |
While we're still open to someone with capacity taking this one on, since it's been some time without anyone who can it seems the previous lifecycle was accurate: /lifecycle rotten If you're interested in picking this one up, let us know and we will support you! |
It hasn't risen to the top of the todo list yet especially since it needs so much searching out for help and its not clear who can do so to me. (sig-auth, sig-node, sig-cluster-lifecycle, other?) If we could identify some developers with knowledge of roughly what needs to be done, to which places, that would go a long way. |
Is it something you'd like to put on the agenda for our next SIG Network meeting and come talk about it with us so we can start figuring it out? |
@kfox1111 can you expand more on how are you doing today to update the certificates in kube-proxy? also to know how do you deploy kube-proxy, are you using a daemonset? |
@shaneutt https://docs.google.com/document/d/1_w77-zG_Xj0zYvEMfQZTQ-wPP4kXkpGD8smVtW_qqWM/edit Mar 28 at 9am pst? I think I can make that, if so. @aojea I'm not yet doing anything but deploying with kubeadm. Ideally though, I'd like to be able to use a spire chain of trust for the cluster, attesting with either tpms on bare metal, or a cloud based node attestor for vms. They have already done a lot of the heavy lifting. We just need a machanism to get the certs from spire to k8s. This would have some big benefits:
|
Was referred to sig-auth from sig-network on this issue. |
@enj we were discussing this issue today during sig network meeting and our understanding was that this is related about how client-go load the certificates so we are moving this to sig auth /sig auth |
client-go is 1/2 of the issue. The server being able to use updated certificates without restart is also important and does not use client-go. |
per triage: |
config in the same |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close not-planned |
@k8s-triage-robot: Closing this issue, marking it as "Not Planned". In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
Still an issue. Please reopen |
This issue is currently awaiting triage. If a SIG or subproject determines this is a relevant issue, they will accept it by applying the The Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
/assign @aroradaman |
Yes. |
Awesome. :) Does it do the CA's too or just the client/server certs? |
Not CA. Only certs. From what I know for kubelet: |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close not-planned |
@k8s-triage-robot: Closing this issue, marking it as "Not Planned". In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
What keywords did you search in Kubernetes issues before filing this one? (If you have found any duplicates, you should instead reply there.): tls certificate reload
Is this a BUG REPORT or FEATURE REQUEST? (choose one): BUG REPORT
Kubernetes version (use
kubectl version
):Environment:
Cloud provider or hardware configuration:
Digital Ocean / custom setup
OS (e.g. from /etc/os-release):
coreos VERSION=1353.7.0
Kernel (e.g.
uname -a
):Linux coreos01.kub.do.modio.se 4.9.24-coreos Unit test coverage in Kubelet is lousy. (~30%) #1 SMP Wed Apr 26 21:44:23 UTC 2017 x86_64 Intel(R) Xeon(R) CPU E5-2650L v3 @ 1.80GHz GenuineIntel GNU/Linux
Install tools:
Ansible / CoreOS getting started guide
Others:
What happened:
We came up to our scheduled update of TLS client certificate, TLS certs were updated properly, but kubelet and kube-proxy keep the old Certs in memory. This causes them to fail when communicating with APIserver.
What you expected to happen:
kubelet & kube proxy should reload the certificates from disk.
How to reproduce it (as minimally and precisely as possible):
Generate a cert with a short lifetime, set up your cluster, wait a while, and then replace the cert with a longer lived one.
Anything else we need to know:
We're attempting to run with short lived client certificates. This has shown some issues with how kubernetes handles it, and will likely cause others to have hard to debug problems in the future.
The text was updated successfully, but these errors were encountered: