-
Notifications
You must be signed in to change notification settings - Fork 6.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Etcd certs: use symlink in kubeadm config #12044
base: master
Are you sure you want to change the base?
Conversation
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: ant31 The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/label ci-extended |
/ok-to-test |
5988197
to
5ef28e0
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Sorry for the delay, I was a bit busy.
And additional thought: When is the kubeadm-config map uploaded exactly ? On first control plane upgrade when using kubeadm upgrade ?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/cherrypick release-2.27
/cherrypick release-2.26
/cherrypick release-2.27 Review comments are not taken into account by the cherrypicker apparently... |
@VannTen: once the present PR merges, I will cherry-pick it on top of In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
d608ac8
to
dd1b894
Compare
/lgtm |
# Symlinks to etcd certs | ||
kube_etcd_cacert_file: "kube-client-ca.pem" | ||
kube_etcd_cert_file: "kube-client-cert.pem" | ||
kube_etcd_key_file: "kube-client-key.pem" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Seems to conflict with cilium / calico (with etcd datatstore presumably), given the test results.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
yes, I'll have to dig a bit more here. maybe need to run the symlink tasks from the calico/cilium roles
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
yes, I'll have to dig a bit more here. maybe need to run the symlink tasks from the calico/cilium roles
Was going to suggest this. Currently calico and cilium both use state: hard
instead of state: link
, not sure if they need to be hard links, but I'd prefer to convert them to symbolic links (state: link
) if possible as symbolic has fewer limitations, such as the ability to create the link under mount paths with destinations backed by different devices.
What type of PR is this?
/kind bug
What this PR does / why we need it:
kubeadm is fetching the configuration from the cluster instead of reading the file locally.
The configuration must be valid on every nodes, this PR creates symbolic link to the etcd certs and use the symbolic link inside the kubeadm-config.
Introduce a new variable
etcd_cert_paths
that keep track of the absolute path to certs.Which issue(s) this PR fixes:
Fixes #
Special notes for your reviewer:
Does this PR introduce a user-facing change?: