-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support k8s clusters behind firewall/NAT using a single teleport cluster #3667
Comments
@benarent WDYT? |
I like this strategy because it fits very well with our existing flow of nodes joining the cluster, as far as I understand, your suggestion is to let teleport proxy to join the cluster. What would help if you wrote down imaginary documentation - quickstart for this feature consisting of folks setting up teleport using new flow, so we can see what use cases will work and how folks would set this up, for example:
This will allow us to elaborate on the use cases we would be able to cover and may be think through some edge cases. |
I like the idea overall - numerous people have expressed a desire to have something that looks like "one auth server with many Teleport proxies connected" where each proxy represents a different k8s cluster. I do have some concerns around how we document this feature in a way people will be able to understand plus what the |
Thanks for the feedback! In terms of UX example:
(figuratively, it's really a yaml blob)
We can reuse the existing tunneling logic used by trusted clusters to get proxies connected. The probing logic for The biggest piece of new logic is teaching
|
As a side note, it would be great to abstract all the tunneling/connectivity features away from IoT, trusted clusters and k8s clusters. I don't know how yet, but those connectivity details should be hidden from the user. |
This was implemented in #4611 |
Feature Request
Similar to IoT mode, but for k8s protocol:
This should support multiple k8s clusters per a single teleport cluster.
The in-cluster proxies should advertise which k8s cluster they are representing.
Motivation
Currently, the only way to achieve something similar is with trusted clusters: one leaf cluster per k8s cluster and a shared root cluster.
This is harder to configure and manage, and auth servers in leaf clusters are unnecessary, wasting compute resources.
Who's it for?
OSS User, Pro, Enterprise
The text was updated successfully, but these errors were encountered: