You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Currently when IPSec is enabled kube-ovn-controller is responsible for:
enabling IPSec in OVNNB
generating the ovn-ipsec-ca secret if it doesn't exist
signing CSRs from kube-ovn-cni pods
In our k8s deployments we use cert-manager to sign all our other CSRs and ideally we would use it for IPSec as well.
I think I can achieve this currently by removing permissions for certificates.k8s.io apiGroups in the system:ovn ClusterRole. kube-ovn-controller appears healthy but it does then periodically log errors:
0311 15:56:39.748324 7 reflector.go:561] k8s.io/[email protected]/tools/cache/reflector.go:243: failed to list *v1.CertificateSigningRequest: certificatesigningrequests.certificates.k8s.io is forbidden: User "system:serviceaccount:kube-system:ovn" cannot list resource "certificatesigningrequests" in API group "certificates.k8s.io" at the cluster scope
E0311 15:56:39.748424 7 reflector.go:158] "Unhandled Error" err="k8s.io/[email protected]/tools/cache/reflector.go:243: Failed to watch *v1.CertificateSigningRequest: failed to list *v1.CertificateSigningRequest: certificatesigningrequests.certificates.k8s.io is forbidden: User \"system:serviceaccount:kube-system:ovn\" cannot list resource \"certificatesigningrequests\" in API group \"certificates.k8s.io\" at the cluster scope" logger="UnhandledError"
It would be nice if there was a config flag to disable the csrInformer and not generate the ovn-ipsec-ca secret but still enable ipsec in ovnnb. And then a helm value to set the config flag and toggle the ClusterRole permissions.
Who will benefit from this feature?
IPSec users that use cert-manager
Anything else?
No response
The text was updated successfully, but these errors were encountered:
Looks like the kube-ovn-cni pods should also create cert-manager CertificateRequests rather than k8s CertificateSigningRequests. cert-manager does have experimental support for signing CSRs.
Description
Currently when IPSec is enabled kube-ovn-controller is responsible for:
In our k8s deployments we use cert-manager to sign all our other CSRs and ideally we would use it for IPSec as well.
I think I can achieve this currently by removing permissions for
certificates.k8s.io
apiGroups in thesystem:ovn
ClusterRole. kube-ovn-controller appears healthy but it does then periodically log errors:It would be nice if there was a config flag to disable the csrInformer and not generate the ovn-ipsec-ca secret but still enable ipsec in ovnnb. And then a helm value to set the config flag and toggle the ClusterRole permissions.
Who will benefit from this feature?
IPSec users that use cert-manager
Anything else?
No response
The text was updated successfully, but these errors were encountered: