-
Notifications
You must be signed in to change notification settings - Fork 315
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Kubernetes internal cert only valid for ip 10.0.0.1 #399
Comments
Might be related to Azure/acs-engine#2656 ? ("Adding parameter to specify more master SANs") |
Looks related, although the unit tests in this PR look fine (checking for the expected standard hostnames) |
Although I think the API should always be accessible from standard host names I'm using https://github.com/fabric8io/kubernetes-client to access the kubernetes api and it currently doesn't have any lookup mecanism based on environment variables and defaults to Filed a PR to fix it fabric8io/kubernetes-client#1086 |
This problem may also affect jobs submitted to Apache Spark on AKS:
|
Hitting it too on 1.9.6 trying to deploy zalando/zelenium chart. |
I'm also hitting this on 1.9.6 and 1.8.11 when using the Jenkins k8s plugin and it tries to query the kube API. |
Just tried this on a fresh AKS cluster built yesterday (westeurope). Running from inside a pod... Extract certificate: (save it to Check subject alt names: Result:
I think this looks OK? Is it worth re-testing on a new cluster? |
Hi @tomconte, looks good, I'll rebuild my test cluster to verify. |
On eastus, still doesn't work. It only has the IP Address 10.0.0.1 |
@tomconte I confirm it works on |
@tomconte Looks like it is not so simple. I rebuilt several clusters in westeurope today, and I'm up to the point where the certificate is correct in some cases, but not in some others |
Like @ams0 I ran into this issue when deploying the zalenium helm chart on AKS.
|
I've provisioned three clusters today in US East, 1.7.16, 1.8.10, and 1.9.6 and was able to verify that all of them had correctly configured certs via: and then:
It's worrisome that this issue is so unpredicatable but I guess for now I can't replicate. |
The issue seems to be intermittent. We are still investigating. |
We identified the bug. This impacts AKS clusters with newer infrastructure feature. We will update here once the rollout is completed. |
@weinong any idea of the timeline of that fix? |
Having the same issue, any timeline? |
@carota24 |
AFAICT the fix should be deployed this week, maybe @rite2nikhil can confirm? |
The issue is now fixed for me with a new AKS cluster. |
for ip address 10.0.0.1 guide yo can look here = https://10-0-0-1.net/ |
I recreated an AKS cluster recently (k8s 1.9.6) and I'm experiencing failures accessing the kubernetes endpoint through
kubernetes.default.svc
from inside a pod.This used to work before so I assume something has changed.
The text was updated successfully, but these errors were encountered: