-
Notifications
You must be signed in to change notification settings - Fork 29
[docs] Enabling authn/authz #95
Comments
currently k8s starts via fleet units which allows easily make changes redeploy the changed unit. |
Here are the pertinent links to the Kubernetes docs (this isn't an RTFM but since they've got documentation, it seemed simpler):
The problem I'm trying to solve first is I want to provide the necessary I realize that this might not be something you want to support within kube-solo but if we can work together on an approach, I don't mind writing the documentation so that others could do this. Being the optimist I am, I do bet there is some way we can make kube-solo pick up some configuration (environment variable, config file, ...) from the host system on an opt-in basis. |
@rimusz If I've got kube-solo already running, how should I go about changing the fleet unit and getting it deployed? I've not used fleet directly so I'm not even sure how to start. I'm hoping I can use a kube-solo distribution and that I don't have to build/run a custom one. If that is the case, do you mind pointing me in the right direction on getting started? |
I just realized kube-solo ships with a fleet UI so I will start there. |
@whitlockjc fleet might be gone from the next version, just do the systemd unit and add it to cloud-init file |
So as things stand now, I could update |
@whitlockjc the latest version v0.8.7 has no fleet anymore, so update user-data file |
I've had trouble updating to |
@whitlockjc update the kube-apiserver.service in fleet folder, then it that folder run ' fleetctl destroy kube-apiserver.service && fleetctl start kube-apiserver.serrvice' and the kube-apiserver will redeployed |
@whitlockjc |
Thanks a lot @rimusz. I did finally figure out the |
no worries @whitlockjc |
I think it's possible to keep it enabled all the time but it would likely not make sense. I wanted to test the OIDC support for authentication and now that I've done that, I want to switch back to the default kube-solo approach using a certificate. I do think that if you want a simple kube-solo, you don't want extra authn/authz. But if you find the need to test or use authn/authz, knowing how to enable it would be pretty useful. |
ok, then just drop your updated |
You got it. I'll go through the process to make sure the |
awesome, thanks |
@whitlockjc I'm also interested in enabling RBAC. Have you posted your procedure anywhere? I specifically have a need for some pods to be able to interact with the K8s API (currently they are getting denied). After enabling RBAC, my thought was to create a service account with the appropriate roles bound to it that given them access to query the API. Thanks for your input. -- One additional thing... can the certificate approach allow a container process to access the API? |
Enabling authn/authz is the same. You update your |
What would your suggestion be for enabling authn/authz when using kube-solo? I can think of a few ways that might work but before doing extra work or doing it in an unsuggested way, I figured I would ask. There are really two topics here:
Thoughts?
The text was updated successfully, but these errors were encountered: