21:02:26 #startmeeting containers 21:02:27 Meeting started Tue Jan 29 21:02:26 2019 UTC and is due to finish in 60 minutes. The chair is strigazi. Information about MeetBot at http://wiki.debian.org/MeetBot. 21:02:28 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 21:02:30 The meeting name has been set to 'containers' 21:02:34 #topic Roll Call 21:02:45 o/ 21:02:48 o/ 21:02:55 o/ 21:04:00 o/ 21:04:38 #topic Stories/Tasks 21:05:24 From my side: 21:05:34 k8s v1.11.6 images rebuilt https://review.openstack.org/#/c/633478/ 21:06:00 (v1.11.7 was out just yesterday) 21:06:37 tiller deployment can be taken in, please review https://review.openstack.org/#/c/612336/ 21:07:40 from us: 21:07:52 two patches for upgrades: add openssh clients to the heat-agent https://review.openstack.org/#/c/633504/ AND add the agent to all nodes: https://review.openstack.org/#/c/561858/ 21:07:53 we just got kubernetes org approval to submit 21:08:06 so we might have some openstack-ccm updates to provide in the near future 21:08:34 cluster autoscaler work and inplace upgrades for the centos driver 21:08:57 once this is in place and stable ill be making effort to upstreaming the driver 21:09:09 we run v1.13.2 atm as well 21:09:31 we also want to finalize any core magnum changes we'd probably need to do 21:10:06 imdigitaljim: please build also the ci for the special centos image. 21:10:13 cluster-autoscaler work is k8s specific (mostly), trivial driver changes if any i forget 21:10:19 o/ 21:10:19 yes i definitely will 21:10:23 make an mvp centos CI 21:11:47 although strigazi: i might need some help getting that setup im unfamiliar 21:12:11 to connect with existing stuff to be easily consumed 21:12:22 for the cluster-autoscaler I'm testing our own https://github.com/cernops/autoscaler/pull/3 21:12:34 ill forward to our cas man 21:12:34 I'm giving priority to that one. 21:12:44 sorry, i'm late 21:13:12 nice strigazi looks like a lot of progress 21:15:39 strigazi: what are we discussing? 21:16:21 i'd like to discuss the k8s image versions we support, related to patch https://review.openstack.org/633650 21:16:58 flwang: looks ok, maybe we can use the vars file 21:17:25 other than that it is ok 21:17:58 flwang: what do you think? 21:18:33 strigazi: use vars is also ok for me and it's more clean i think, i will propose another patchset 21:19:11 flwang: thanks, building all of them is fine 21:19:27 I have another thing I want to discuss 21:19:46 We have an issue in k8s_fedora 21:19:53 maybe in centos that imdigitaljim is solved 21:20:07 k8s uostrean beeds three CAs 21:20:21 CA= certificate authority not cluster autoscaler 21:20:28 one for etcd 21:20:36 one for front-proxy 21:20:43 and one for the API 21:20:58 In magnum we create only one. 21:21:41 In the same manner that we create the service account keys, we need two more CAs. 21:22:00 what's the affection now? 21:22:23 affection/impact i mean 21:22:36 For example, a new feature like the metrics-server doesn't work correctly 21:22:37 is there any security hole now? 21:22:39 see here: 21:22:49 oh? 21:23:03 helm chart metrics server? 21:23:04 https://review.openstack.org/#/c/632392/ 21:23:21 https://review.openstack.org/#/c/632392/4/magnum/drivers/common/templates/kubernetes/fragments/configure-kubernetes-master.sh@75 21:23:31 This option kind of works 21:23:43 but the proper thing to do is to have tree CAs 21:23:52 see docs here: 21:24:35 https://github.com/kubernetes/website/blob/master/content/en/docs/setup/certificates.md 21:25:00 so you mean though we can use the current, only one, CA, but we'd better to create 3, right? 21:25:18 installing the metrics-server with helm or not, it doesn'r matter 21:25:23 flwang: yes 21:25:38 quoting docs: You can create a single root CA, controlled by an administrator. This root CA can then create multiple intermediate CAs, and delegate all further creation to Kubernetes itself. 21:26:17 yeah 21:26:24 1 CA is okay 21:26:24 having these three CAs would make the transition to kubeadm ~trivial 21:26:27 3 CA is better 21:26:31 strigazi: i see 21:26:47 kubeadm will try to create these three CAs. 21:26:53 strigazi: so i think it's important but not urgent issue 21:27:01 if you provide them it will use them 21:27:08 cool 21:27:22 also note: we dont use kubeadm at this time 21:27:27 in case you were wondering 21:27:52 theres a few issues in using kubeadm that we need to be better before/if we transition to them 21:28:02 i think they are publicly listed in their design docs 21:28:31 kubeadm or not, to use API aggregators we need to deploy front-proxy certs properly 21:29:09 Feilong Wang proposed openstack/magnum stable/pike: support http/https proxy for discovery url https://review.openstack.org/633755 21:31:16 docs for front proxy: https://kubernetes.io/docs/tasks/access-kubernetes-api/configure-aggregation-layer/ 21:32:19 Warning: Do not reuse a CA that is used in a different context unless you understand the risks and the mechanisms to protect the CA’s usage. 21:32:20 :D 21:32:24 i see your concern 21:32:25 Keith Berger proposed openstack/magnum stable/pike: support http/https proxy for discovery url https://review.openstack.org/633755 21:33:47 I can mention a horrible side-effect of using one CA. using the same CA to sign certs for kubelets and etcd, means compromise of kubelet certs gives access to etcd. 21:34:20 sure 21:34:22 provided that there is a route from from the kubelet node to etcd 21:34:40 preventing lateral movement is always good 21:34:41 same for the etcd that calico uses 21:35:22 ill probably start working on solving some of these in the upcoming weeks 21:35:30 good point out strigazi 21:35:44 yeah. been working on Octavia on the side and have been going through this due to all the CAs it uses to secure communications between components 21:36:23 and wanting them to be signed uniquely by service made deployment more complex but ultimately better for the security, imo 21:37:54 it is a ~chicken-egg problem. Who sings whose certs :) 21:38:19 we were looking at other solutions like vault as a CA 21:38:22 and such 21:38:24 The problem to cert management in kubernetes is more CAs 21:38:32 https://github.com/hashicorp/vault 21:38:43 s/problem/solution/ 21:38:44 not sure their CA capabilities 21:41:49 Anything else anyone? (the day is ending for me) 21:42:10 not here 21:42:11 o/ 21:42:42 flwang colin- jakeyip anything else? 21:43:00 jakeyip: for tempest python3, all good? 21:43:44 Nothing to report :) 21:44:22 cool 21:44:49 nope 21:45:00 let's end the meeting then 21:45:09 have a good night! 21:45:17 see you next week 21:45:21 colin-: cheers 21:45:22 bye all 21:45:49 #endmeeting