-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
unable to authenticate to kube-apiserver from trusted cluster #3063
Comments
I went through all the data in dynamodb and don't see either kube-apiserver address in there. How does teleport know where to forward the kube-apiserver requests to? |
Not positive but I think they may have fixed this in 4.1.1. We had a similar issue, though our main teleport cluster isn't running on k8s like yours is. I believe that the kube-apiserver address and CA come from the kubernetes client when you're running on a k8s cluster and not specifically supplying them via config. I.e. third party code, not in the teleport repo... |
Yes, a bug fix was made in to the Kubernetes forwarding in Teleport 4.1.1 which should fix this issue. Please upgrade and let us know how you get on. |
@drewwells Did you test a version of Teleport >4.1.0? |
I have not tested this, not getting emails from this issue for some reason. I'll give it a shot |
Fixed in #3070 4.1.1 release |
Have a question? Please use Our Forum
What happened:
login to trusted cluster
able to successfully ssh to nodes in trusted cluster
unable to use kubectl to authenticate to trusted cluster kube-apiserver. It appears that the credentials being used are invalid for the kube-apiserver
From
main
auth-serviceWhat you expected to happen:
kubectl would successfully forward through auth-server
main
to proxyeast
and on to kube-apiserver.How to reproduce it (as minimally and precisely as possible):
deploy the helm chart to two clusters. There's several things that need to be changed, most notably. --advertise-ip needs to be set to the address where proxy is running (pod IP).
Environment:
teleport version
): v4.1.0 v4.2.0-alpha.1tsh version
): v4.1.0Relevant Debug Logs If Applicable
If you specify kubeconfigs for both clusters, you will notice that the main auth_service opens a tunnel to
east
auth_service and then requests its own kube-apiserver. It appears that instead of requestingeast
open a connection to kube-apiserver that it's using its own kube-apiserver credentials to make the connection which is incorrect.This issue is masked when using in-cluster config as both connections are made to
kubernetes.default.svc
so this bug becomes less obvious.The text was updated successfully, but these errors were encountered: