-
Notifications
You must be signed in to change notification settings - Fork 33
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
unsupportedBuiltInPlugins - nodeAttestor x509pop #188
Comments
Hi @mrod23, thanks for filing the issue. There are some devils in the details here.... Have you tried it yet with the unsupportedBuiltInPlugins? I'm curious if some of the other constraints can be overcome. In particular, I don't believe the k8s workload attestor works without the k8s node attestor. and you cant have more then one node attestor enabled on an agent. So attesting the nested spire (assuming thats what your trying to do) might be a little tricky on the workload side if using an x509pop node attestor. Still may be possible if your nodes are static but maybe pretty problematic on a cloud based k8s? Probably more discussion/experimentation would be needed to flesh out all the details. Could you please provide more information about what you are trying to do? |
I just got some confirmation that you can use x509pop with k8s workload if you don't use the spire-controller-manager but manually register the workload with the right parentids in the upstream server. |
Another constraint:
|
There is a PR here spiffe/spire-controller-manager#289 that should enable the use case of managing the system with spire-controller-manager while using the x509pop node atttestor and k8s workload attestor. |
Thanks for the response here. For production I think I'll use PSAT for NodeAttestation. |
so, one node local cluster, with x509 pop for attestation of the downstream, and then nested spire for all the rest of the workload? yeah, should be able to use the unsupportedBuiltInPlugins section on the upstream agent for now to prevent having to manually tweak the configmap, use the x509 cert loaded on the host with a hostpath extra volume/mount, and on the root server, don't use spire-controller-manager but manually setup entries for the downstream. I think that configuration should work for now for testing. |
thanks, will try that out |
@mrod23 Have you had a chance to look into this yet? |
I winded up not trying this. |
When you say 9 different agents, do you mean 1 install of the chart with 9 different x509 certs, one per host, I think the first option would work. |
One install of the chart creates 9 different agents. Each agent needed it's
own separate x509 cert.
…On Thu, Feb 22, 2024, 09:54 kfox1111 ***@***.***> wrote:
When you say 9 different agents, do you mean 1 install of the chart with 9
different x509 certs, one per host,
or are you trying 9 different chart installs/daemonsets/x509 certs?
I think the first option would work.
—
Reply to this email directly, view it on GitHub
<#188 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AA46OSPKYGSBKXPOIFYLGM3YU5L2FAVCNFSM6AAAAABB5O2OZGVHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMYTSNJZGYZDANJUGY>
.
You are receiving this because you were mentioned.Message ID:
***@***.***>
|
Feature request to add support for nodeAttestor support for spire-agent.
x509pop is an easy way to get the spire-agent-upstream connected with a spire-server that sits outside Kubernetes. It would be nice to have official support for x509pop on the spire-agent.
Also, I've only used helm a few times in the past, but I'm open to learning and contributing to the project.
The text was updated successfully, but these errors were encountered: