Some clients inside pods talk to the API server via
https://$KUBERNETES_SERVICE_HOST:$KUBERNETES_SERVICE_PORT,
where $KUBERNETES_SERVICE_HOST is the IP of the service injected into the
pod as an envvar, hence the IP SAN.





On Mon, Apr 17, 2017 at 8:32 PM, Brandon Philips <brandon.phil...@coreos.com
> wrote:

> Hello John-
>
> Today, etcd will not enforce IP SANs but we just merged a change where it
> will enforce them IF they exist. Expect this change in a future release of
> etcd v3.2.[1]
>
> I forget the exact details on why IP SANs are necessary in the
> certificates. However, IIRC there are some places in Kubernetes where only
> IPs are valid. Adding SIG Auth.
>
> Brandon
>
> [1] https://github.com/coreos/etcd/pull/7687
>
> On Mon, Apr 17, 2017 at 10:33 AM John Morris <j...@zultron.com> wrote:
>
>> In a CoreOS cluster migrating from fleet to Kubernetes (initial planning
>> stage), the CA is part of FreeIPA, which refuses to issue certs with IP
>> SANs [1].  However, the CoreOS Kubernetes [2] and other documentation all
>> call for issuing certs with IP SANs.  Is this a strict requirement, or can
>> DNS SANs be sufficient?  (For someone more conversant with k8s, it looks
>> like the answer could be found in issue #22063 [3].)
>>
>> IIRC, the etcd2 docs also called for IP SANs, but using fqdns in endpoint
>> URLs turned out to be possible.  Hopefully this is just another case where
>> the docs omit less common configurations.  It's been really nice having a
>> single, org-wide CA and letting certmonger keep certs up to date for all
>> services on all nodes.  Thanks-
>>
>>         John
>>
>> [1]: https://www.redhat.com/archives/freeipa-users/2016-
>> October/msg00053.html
>> [2]: https://coreos.com/kubernetes/docs/latest/openssl.html#
>> openssl-config
>> [3]: https://github.com/kubernetes/kubernetes/issues/22063
>>
>> --
>> You received this message because you are subscribed to the Google Groups
>> "Kubernetes user discussion and Q&A" group.
>> To unsubscribe from this group and stop receiving emails from it, send an
>> email to kubernetes-users+unsubscr...@googlegroups.com.
>> To post to this group, send email to kubernetes-users@googlegroups.com.
>> Visit this group at https://groups.google.com/group/kubernetes-users.
>> For more options, visit https://groups.google.com/d/optout.
>>
> --
> You received this message because you are subscribed to the Google Groups
> "kubernetes-sig-auth" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to kubernetes-sig-auth+unsubscr...@googlegroups.com.
> To post to this group, send email to kubernetes-sig-a...@googlegroups.com.
> To view this discussion on the web visit https://groups.google.com/d/
> msgid/kubernetes-sig-auth/CAD2oYtNsX3tWES61cE-DCHHpB3wsW5f5-hOf%3D%
> 2BehQjRti4C%3DrA%40mail.gmail.com
> <https://groups.google.com/d/msgid/kubernetes-sig-auth/CAD2oYtNsX3tWES61cE-DCHHpB3wsW5f5-hOf%3D%2BehQjRti4C%3DrA%40mail.gmail.com?utm_medium=email&utm_source=footer>
> .
> For more options, visit https://groups.google.com/d/optout.
>

-- 
You received this message because you are subscribed to the Google Groups 
"Kubernetes user discussion and Q&A" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to kubernetes-users+unsubscr...@googlegroups.com.
To post to this group, send email to kubernetes-users@googlegroups.com.
Visit this group at https://groups.google.com/group/kubernetes-users.
For more options, visit https://groups.google.com/d/optout.

Reply via email to