mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-08-04 01:40:07 +00:00
Add an advertise-address flag. This allows the address that the apiserver binds
to (possibly 0.0.0.0) to be different than the address on which members of the cluster can reach the apiserver (possibly not a local interface).
This commit is contained in:
parent
16d3531e90
commit
085a48a70e
@ -496,6 +496,7 @@ project-id = ${PROJECT_ID}
|
|||||||
EOF
|
EOF
|
||||||
cat <<EOF >>/etc/salt/minion.d/grains.conf
|
cat <<EOF >>/etc/salt/minion.d/grains.conf
|
||||||
cloud_config: /etc/gce.conf
|
cloud_config: /etc/gce.conf
|
||||||
|
advertise_address: '${KUBERNETES_MASTER_NAME}'
|
||||||
EOF
|
EOF
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
@ -22,6 +22,11 @@
|
|||||||
|
|
||||||
{% endif -%}
|
{% endif -%}
|
||||||
|
|
||||||
|
{% set advertise_address = "" -%}
|
||||||
|
{% if grains.advertise_address is defined -%}
|
||||||
|
{% set advertise_address = "--advertise-address=" + grains.advertise_address -%}
|
||||||
|
{% endif -%}
|
||||||
|
|
||||||
{% set address = "--address=127.0.0.1" -%}
|
{% set address = "--address=127.0.0.1" -%}
|
||||||
|
|
||||||
{% set cluster_name = "" -%}
|
{% set cluster_name = "" -%}
|
||||||
@ -29,9 +34,9 @@
|
|||||||
{% set cluster_name = "--cluster_name=" + pillar['instance_prefix'] -%}
|
{% set cluster_name = "--cluster_name=" + pillar['instance_prefix'] -%}
|
||||||
{% endif -%}
|
{% endif -%}
|
||||||
|
|
||||||
{% set publicAddressOverride = "" -%}
|
{% set bind_address = "" -%}
|
||||||
{% if grains.publicAddressOverride is defined -%}
|
{% if grains.publicAddressOverride is defined -%}
|
||||||
{% set publicAddressOverride = "--public_address_override=" + grains.publicAddressOverride -%}
|
{% set bind_address = "--bind-address=" + grains.publicAddressOverride -%}
|
||||||
{% endif -%}
|
{% endif -%}
|
||||||
|
|
||||||
{% set etcd_servers = "--etcd_servers=http://127.0.0.1:4001" -%}
|
{% set etcd_servers = "--etcd_servers=http://127.0.0.1:4001" -%}
|
||||||
@ -75,8 +80,7 @@
|
|||||||
{% endif -%}
|
{% endif -%}
|
||||||
|
|
||||||
{% set params = address + " " + etcd_servers + " " + cloud_provider + " " + cloud_config + " " + runtime_config + " " + admission_control + " " + service_cluster_ip_range + " " + client_ca_file + " " + basic_auth_file -%}
|
{% set params = address + " " + etcd_servers + " " + cloud_provider + " " + cloud_config + " " + runtime_config + " " + admission_control + " " + service_cluster_ip_range + " " + client_ca_file + " " + basic_auth_file -%}
|
||||||
{% set params = params + " " + cluster_name + " " + cert_file + " " + key_file + " --secure_port=" + secure_port + " " + token_auth_file + " " + publicAddressOverride + " " + pillar['log_level'] -%}
|
{% set params = params + " " + cluster_name + " " + cert_file + " " + key_file + " --secure_port=" + secure_port + " " + token_auth_file + " " + publicAddressOverride + " " + pillar['log_level'] + " " + advertise_address -%}
|
||||||
|
|
||||||
|
|
||||||
{
|
{
|
||||||
"apiVersion": "v1beta3",
|
"apiVersion": "v1beta3",
|
||||||
|
@ -58,6 +58,7 @@ type APIServer struct {
|
|||||||
InsecureBindAddress util.IP
|
InsecureBindAddress util.IP
|
||||||
InsecurePort int
|
InsecurePort int
|
||||||
BindAddress util.IP
|
BindAddress util.IP
|
||||||
|
AdvertiseAddress util.IP
|
||||||
ReadOnlyPort int
|
ReadOnlyPort int
|
||||||
SecurePort int
|
SecurePort int
|
||||||
ExternalHost string
|
ExternalHost string
|
||||||
@ -145,8 +146,13 @@ func (s *APIServer) AddFlags(fs *pflag.FlagSet) {
|
|||||||
"Defaults to localhost.")
|
"Defaults to localhost.")
|
||||||
fs.Var(&s.InsecureBindAddress, "address", "DEPRECATED: see --insecure-bind-address instead")
|
fs.Var(&s.InsecureBindAddress, "address", "DEPRECATED: see --insecure-bind-address instead")
|
||||||
fs.Var(&s.BindAddress, "bind-address", ""+
|
fs.Var(&s.BindAddress, "bind-address", ""+
|
||||||
"The IP address on which to serve the --read-only-port and --secure-port ports. This "+
|
"The IP address on which to serve the --read-only-port and --secure-port ports. The "+
|
||||||
"address must be reachable by the rest of the cluster. If blank, all interfaces will be used.")
|
"associated interface(s) must be reachable by the rest of the cluster, and by CLI/web "+
|
||||||
|
"clients. If blank, all interfaces will be used (0.0.0.0).")
|
||||||
|
fs.Var(&s.AdvertiseAddress, "advertise-address", ""+
|
||||||
|
"The IP address on which to advertise the apiserver to members of the cluster. This "+
|
||||||
|
"address must be reachable by the rest of the cluster. If blank, all interfaces will be "+
|
||||||
|
"used.")
|
||||||
fs.Var(&s.BindAddress, "public-address-override", "DEPRECATED: see --bind-address instead")
|
fs.Var(&s.BindAddress, "public-address-override", "DEPRECATED: see --bind-address instead")
|
||||||
fs.IntVar(&s.ReadOnlyPort, "read-only-port", s.ReadOnlyPort, ""+
|
fs.IntVar(&s.ReadOnlyPort, "read-only-port", s.ReadOnlyPort, ""+
|
||||||
"The port on which to serve read-only resources. If 0, don't serve read-only "+
|
"The port on which to serve read-only resources. If 0, don't serve read-only "+
|
||||||
@ -356,7 +362,7 @@ func (s *APIServer) Run(_ []string) error {
|
|||||||
CorsAllowedOriginList: s.CorsAllowedOriginList,
|
CorsAllowedOriginList: s.CorsAllowedOriginList,
|
||||||
ReadOnlyPort: s.ReadOnlyPort,
|
ReadOnlyPort: s.ReadOnlyPort,
|
||||||
ReadWritePort: s.SecurePort,
|
ReadWritePort: s.SecurePort,
|
||||||
PublicAddress: net.IP(s.BindAddress),
|
PublicAddress: net.IP(s.AdvertiseAddress),
|
||||||
Authenticator: authenticator,
|
Authenticator: authenticator,
|
||||||
SupportsBasicAuth: len(s.BasicAuthFile) > 0,
|
SupportsBasicAuth: len(s.BasicAuthFile) > 0,
|
||||||
Authorizer: authorizer,
|
Authorizer: authorizer,
|
||||||
@ -443,6 +449,7 @@ func (s *APIServer) Run(_ []string) error {
|
|||||||
if s.TLSCertFile == "" && s.TLSPrivateKeyFile == "" {
|
if s.TLSCertFile == "" && s.TLSPrivateKeyFile == "" {
|
||||||
s.TLSCertFile = path.Join(s.CertDirectory, "apiserver.crt")
|
s.TLSCertFile = path.Join(s.CertDirectory, "apiserver.crt")
|
||||||
s.TLSPrivateKeyFile = path.Join(s.CertDirectory, "apiserver.key")
|
s.TLSPrivateKeyFile = path.Join(s.CertDirectory, "apiserver.key")
|
||||||
|
// TODO (cjcullen): Is PublicAddress the right address to sign a cert with?
|
||||||
if err := util.GenerateSelfSignedCert(config.PublicAddress.String(), s.TLSCertFile, s.TLSPrivateKeyFile); err != nil {
|
if err := util.GenerateSelfSignedCert(config.PublicAddress.String(), s.TLSCertFile, s.TLSPrivateKeyFile); err != nil {
|
||||||
glog.Errorf("Unable to generate self signed cert: %v", err)
|
glog.Errorf("Unable to generate self signed cert: %v", err)
|
||||||
} else {
|
} else {
|
||||||
|
@ -125,7 +125,9 @@ type Config struct {
|
|||||||
// ExternalHost is the host name to use for external (public internet) facing URLs (e.g. Swagger)
|
// ExternalHost is the host name to use for external (public internet) facing URLs (e.g. Swagger)
|
||||||
ExternalHost string
|
ExternalHost string
|
||||||
|
|
||||||
// If nil, the first result from net.InterfaceAddrs will be used.
|
// PublicAddress is the IP address where members of the cluster (kubelet,
|
||||||
|
// kube-proxy, services, etc.) can reach the master.
|
||||||
|
// If nil or 0.0.0.0, the first result from net.InterfaceAddrs will be used.
|
||||||
PublicAddress net.IP
|
PublicAddress net.IP
|
||||||
|
|
||||||
// Control the interval that pod, node IP, and node heath status caches
|
// Control the interval that pod, node IP, and node heath status caches
|
||||||
|
Loading…
Reference in New Issue
Block a user