Skip to content

RFD 122: Robust Access to Kubernetes clusters#26014

Merged
tigrato merged 1 commit intomasterfrom
rfd/0122-robust-access-to-kubernetes-clusters
May 12, 2023
Merged

RFD 122: Robust Access to Kubernetes clusters#26014
tigrato merged 1 commit intomasterfrom
rfd/0122-robust-access-to-kubernetes-clusters

Conversation

@tigrato
Copy link
Copy Markdown
Contributor

@tigrato tigrato commented May 10, 2023

This RFD states the case where users can access the Kubernetes cluster when there is intermittent or no connectivity to Auth server.

Users with cached client-side certificates for the target Kubernetes cluster can access the cluster under certain scenarios.

Rendered version

Part of #25541

@tigrato tigrato changed the title RFD-122: Robust Access to Kubernetes clusters RFD 122: Robust Access to Kubernetes clusters May 10, 2023
@tigrato
Copy link
Copy Markdown
Contributor Author

tigrato commented May 10, 2023

#25202 implements almost all the functionality after last quarter's implementation of #23978

The missing piece left is to allow moderated sessions when no auth exists if no moderator is required.

@tigrato tigrato marked this pull request as ready for review May 10, 2023 17:55
@tigrato tigrato requested review from r0mant and rosstimothy May 10, 2023 17:55
@tigrato tigrato added kubernetes-access rfd Request for Discussion labels May 10, 2023
@github-actions github-actions Bot requested a review from greedy52 May 10, 2023 17:59
Comment thread rfd/0122-kube-offline-access.md Outdated
Comment thread rfd/0122-kube-offline-access.md Outdated
Comment thread rfd/0122-kube-offline-access.md Outdated
Comment on lines 153 to 152
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is this to be completed with the other work needed to implement this RFD? Or is this a future consideration?

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is not yet implemented and it's just a future consideration,

When I spoke with @ravicious about it, he mentioned that it would take some effort.

@tigrato tigrato force-pushed the rfd/0122-robust-access-to-kubernetes-clusters branch from d0ba7a6 to 026cc79 Compare May 12, 2023 14:03
Copy link
Copy Markdown
Collaborator

@r0mant r0mant left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can you also update the RFD with how we plan to make sure this functionality doesn't regress once we implement it? Once that's added, lgtm.

@public-teleport-github-review-bot public-teleport-github-review-bot Bot removed the request for review from greedy52 May 12, 2023 14:51
This RFD states the case where users can access Kubernetes cluster when
there is intermittent or no connectivity to Auth server.

User's with cached client-side certificates for the target Kubernetes
cluster can access the cluster under certain scenarios.
@tigrato tigrato force-pushed the rfd/0122-robust-access-to-kubernetes-clusters branch from 026cc79 to 4c38915 Compare May 12, 2023 15:13
@tigrato tigrato added this pull request to the merge queue May 12, 2023
Merged via the queue into master with commit 5236105 May 12, 2023
@tigrato tigrato deleted the rfd/0122-robust-access-to-kubernetes-clusters branch May 12, 2023 15:27
tigrato added a commit that referenced this pull request May 15, 2023
This PR builds the last bit required to allow users to create remote
kubernetes sessions when Auth connection is not available or is
intermitent.

This PR allows a user to continue with the interactive session when the
session does not require any moderation.

PR #25202 deferred the proxy cert creation for cases where the it's
mandatory (kube agent or proxy running version <=12.x.x) which allowed
any user to perform simple requests against a Kubernetes cluster even
when the cluster Auth server is not operational. On top of that, this PR
allows a user to request an interactive session against a pod when auth
conectivity is not required as long as the session isn't moderated.

Part of #25541
Related to #25202
Implements #26014
tigrato added a commit that referenced this pull request May 15, 2023
* Allow non moderated sessions when no-auth connection exists

This PR builds the last bit required to allow users to create remote
kubernetes sessions when Auth connection is not available or is
intermitent.

This PR allows a user to continue with the interactive session when the
session does not require any moderation.

PR #25202 deferred the proxy cert creation for cases where the it's
mandatory (kube agent or proxy running version <=12.x.x) which allowed
any user to perform simple requests against a Kubernetes cluster even
when the cluster Auth server is not operational. On top of that, this PR
allows a user to request an interactive session against a pod when auth
conectivity is not required as long as the session isn't moderated.

Part of #25541
Related to #25202
Implements #26014

* fix formatting
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants