cloud-provider-aws icon indicating copy to clipboard operation
cloud-provider-aws copied to clipboard

Allow for hostnames other than private dns

Open andrewsykim opened this issue 5 years ago • 32 comments

What would you like to be added: Does the out-of-tree AWS cloud provider allow for hostname overrides or at least hostnames that aren't the private DNS name? There's a few issues in kubernetes/kubernetes regarding limitations in the kubelet where it can only assign the private DNS name as a node name, it would be great if the out-of-tree provider allows for more flexiblity here without breaking anything.

Related: https://github.com/kubernetes/kubernetes/issues/54482 https://github.com/kubernetes/kubernetes/issues/52241

Why is this needed: More descriptive node names are generally useful.

/kind feature

andrewsykim avatar Nov 12 '19 17:11 andrewsykim

@justinsb @nckturner @M00nF1sh can you comment on if the out-of-tree provider will allow for hostnames aside from private DNS? I assumption is yes because we will be working with whatever hostname the kubelet (without --cloud-provider=aws) has already.

andrewsykim avatar Nov 12 '19 17:11 andrewsykim

I think we should allow for different hostnames--we have the same assumption in EKS, so I think the out of tree cloud provider would be a perfect place to add the flexibility, and we should remove those assumptions from EKS by the time we migrate to out-of-tree.

nckturner avatar Nov 14 '19 09:11 nckturner

I implemented this on my own. The change is very minimal. The only thing what would probably change in an official patch would be the tag name.

http://cygnusx-1.org/kubernetes-aws-hostnames.patch

edgan avatar Nov 25 '19 19:11 edgan

any news here, on an official solution?

schlitzered avatar Feb 14 '20 08:02 schlitzered

Issues go stale after 90d of inactivity. Mark the issue as fresh with /remove-lifecycle stale. Stale issues rot after an additional 30d of inactivity and eventually close.

If this issue is safe to close now please do so with /close.

Send feedback to sig-testing, kubernetes/test-infra and/or fejta. /lifecycle stale

fejta-bot avatar May 14 '20 08:05 fejta-bot

/remove-lifecycle stale

olfway avatar May 22 '20 16:05 olfway

Issues go stale after 90d of inactivity. Mark the issue as fresh with /remove-lifecycle stale. Stale issues rot after an additional 30d of inactivity and eventually close.

If this issue is safe to close now please do so with /close.

Send feedback to sig-testing, kubernetes/test-infra and/or fejta. /lifecycle stale

fejta-bot avatar Aug 20 '20 17:08 fejta-bot

Stale issues rot after 30d of inactivity. Mark the issue as fresh with /remove-lifecycle rotten. Rotten issues close after an additional 30d of inactivity.

If this issue is safe to close now please do so with /close.

Send feedback to sig-testing, kubernetes/test-infra and/or fejta. /lifecycle rotten

fejta-bot avatar Sep 19 '20 17:09 fejta-bot

Rotten issues close after 30d of inactivity. Reopen the issue with /reopen. Mark the issue as fresh with /remove-lifecycle rotten.

Send feedback to sig-testing, kubernetes/test-infra and/or fejta. /close

fejta-bot avatar Oct 19 '20 18:10 fejta-bot

@fejta-bot: Closing this issue.

In response to this:

Rotten issues close after 30d of inactivity. Reopen the issue with /reopen. Mark the issue as fresh with /remove-lifecycle rotten.

Send feedback to sig-testing, kubernetes/test-infra and/or fejta. /close

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

k8s-ci-robot avatar Oct 19 '20 18:10 k8s-ci-robot

/reopen

olfway avatar Oct 20 '20 09:10 olfway

@olfway: You can't reopen an issue/PR unless you authored it or you are a collaborator.

In response to this:

/reopen

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

k8s-ci-robot avatar Oct 20 '20 09:10 k8s-ci-robot

/reopen

nckturner avatar Mar 19 '21 22:03 nckturner

@nckturner: Reopened this issue.

In response to this:

/reopen

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

k8s-ci-robot avatar Mar 19 '21 22:03 k8s-ci-robot

Rotten issues close after 30d of inactivity. Reopen the issue with /reopen. Mark the issue as fresh with /remove-lifecycle rotten.

Send feedback to sig-contributor-experience at kubernetes/community. /close

fejta-bot avatar Apr 18 '21 23:04 fejta-bot

@fejta-bot: Closing this issue.

In response to this:

Rotten issues close after 30d of inactivity. Reopen the issue with /reopen. Mark the issue as fresh with /remove-lifecycle rotten.

Send feedback to sig-contributor-experience at kubernetes/community. /close

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

k8s-ci-robot avatar Apr 18 '21 23:04 k8s-ci-robot

any chance of this being worked on?

AnthonyPoschen avatar Jul 23 '21 08:07 AnthonyPoschen

/reopen

andrewsykim avatar Aug 18 '21 21:08 andrewsykim

@andrewsykim: Reopened this issue.

In response to this:

/reopen

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

k8s-ci-robot avatar Aug 18 '21 21:08 k8s-ci-robot

The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs.

This bot triages issues and PRs according to the following rules:

  • After 90d of inactivity, lifecycle/stale is applied
  • After 30d of inactivity since lifecycle/stale was applied, lifecycle/rotten is applied
  • After 30d of inactivity since lifecycle/rotten was applied, the issue is closed

You can:

  • Reopen this issue or PR with /reopen
  • Mark this issue or PR as fresh with /remove-lifecycle rotten
  • Offer to help out with Issue Triage

Please send feedback to sig-contributor-experience at kubernetes/community.

/close

k8s-triage-robot avatar Sep 17 '21 21:09 k8s-triage-robot

@k8s-triage-robot: Closing this issue.

In response to this:

The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs.

This bot triages issues and PRs according to the following rules:

  • After 90d of inactivity, lifecycle/stale is applied
  • After 30d of inactivity since lifecycle/stale was applied, lifecycle/rotten is applied
  • After 30d of inactivity since lifecycle/rotten was applied, the issue is closed

You can:

  • Reopen this issue or PR with /reopen
  • Mark this issue or PR as fresh with /remove-lifecycle rotten
  • Offer to help out with Issue Triage

Please send feedback to sig-contributor-experience at kubernetes/community.

/close

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

k8s-ci-robot avatar Sep 17 '21 21:09 k8s-ci-robot

/reopen

wongma7 avatar Mar 19 '22 00:03 wongma7

@wongma7: Reopened this issue.

In response to this:

/reopen

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

k8s-ci-robot avatar Mar 19 '22 00:03 k8s-ci-robot

/remove-lifecycle rotten

wongma7 avatar Mar 19 '22 00:03 wongma7

/triage accepted

nckturner avatar Mar 19 '22 00:03 nckturner

as of 1.23 alpha node names being equal to instance id is allowed by patch https://github.com/kubernetes/cloud-provider-aws/pull/286 which changed internal implementation of func (c *Cloud) InstanceID(ctx context.Context, nodeName types.NodeName) (string, error) {

Basically with in-tree cloudprovider the node name was restricted to privateDNS because that is what CurrentNodeName returned.

With out-of-tree cloudprovider the node name is restricted by what InstanceID can derive instance id from. So we could build on the work of #286 to accept stuff like if the node name simply has prefix instance id or such depending on what people want.

wongma7 avatar Mar 19 '22 00:03 wongma7

however the assumption that private dns == node name is deeply embedded in the v1 impelmentation (e.g. we found bug in route controller where breaking this assumption leads to spammed aws api requests which is obviously a bug ) https://github.com/kubernetes/cloud-provider-aws/pull/319 so it's not trivial to extend support for more node names, it needs lots of testing.

wongma7 avatar Mar 19 '22 00:03 wongma7

The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs.

This bot triages issues and PRs according to the following rules:

  • After 90d of inactivity, lifecycle/stale is applied
  • After 30d of inactivity since lifecycle/stale was applied, lifecycle/rotten is applied
  • After 30d of inactivity since lifecycle/rotten was applied, the issue is closed

You can:

  • Mark this issue or PR as fresh with /remove-lifecycle stale
  • Mark this issue or PR as rotten with /lifecycle rotten
  • Close this issue or PR with /close
  • Offer to help out with Issue Triage

Please send feedback to sig-contributor-experience at kubernetes/community.

/lifecycle stale

k8s-triage-robot avatar Jun 17 '22 01:06 k8s-triage-robot

/remove-lifecycle stale

olfway avatar Jun 17 '22 04:06 olfway

I think we can close this one now. See https://cloud-provider-aws.sigs.k8s.io/prerequisites/

olemarkus avatar Jun 17 '22 05:06 olemarkus