TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Teleport v3.0 introduces Kubernetes support

61 点作者 twakefield超过 6 年前

4 条评论

aberoham超过 6 年前
Kubernetes projects leads would argue that any time a user has to SSH into one of their K8s workers, they should file a bug against Kubernetes. At KubeCon CPH, when I asked Tim Hockin about the long-awaited debug containers feature, aka &#x27;kubectl debug&#x27;, he said that &quot;I really do feel that every time someone has to SSH into a node a ferry loses its wings.&quot; :)<p>Dropping out of or below the cluster layer inherently means there is something in K8s that is missing. But no matter what is added to its APIs, Kubernetes will experience a long tail of weird corner cases that just can’t be covered. Reportedly the same is true with Borg jobs internally within Google.<p>Teleport&#x27;s K8s protocol implementation mates its certificate-based SSH auth with Kubernetes certificate signing request API, plus Teleport acts as a full recording MITM for all K8s apiserver requests. How exactly end-users will leverage this remains to be seen, but we&#x27;re super excited to see where the community takes this (and related tricky K8s vs provider IAM issues) as it continues to expand.<p>Full disclosure -- I work at Gravitational, worked closely with Sasha on this feature[1], and am a fan of Kelsey Hightower&#x27;s live demo keynotes[2] where he frequently quips about the inherent struggle between procedural Dev+Ops encountering declarative APIs such as K8s.<p>[1] <a href="https:&#x2F;&#x2F;github.com&#x2F;gravitational&#x2F;teleport&#x2F;issues&#x2F;1986" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;gravitational&#x2F;teleport&#x2F;issues&#x2F;1986</a> [2] <a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=07jq-5VbBVQ" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=07jq-5VbBVQ</a>
评论 #18127254 未加载
评论 #18125258 未加载
raesene9超过 6 年前
I&#x27;ll be interested to see how this plays out. AuthN for users in k8s clusters is a bit of a pain point from what I&#x27;ve seen in a number of reviews I&#x27;ve done.<p>The in-built options (Basic auth, token auth, client cert) are not really scalable for a larger number of users, and the other options (webhook, OIDC) can be complex to setup.<p>So any relatively easy to use options for this would be welcome.
评论 #18133261 未加载
madjam002超过 6 年前
How does this compare to the OIDC integration with Kubernetes which is supported natively out of the box?<p>You can hook up an enterprise IdP like AD FS with that, without any additional software.
评论 #18125377 未加载
评论 #18125275 未加载
评论 #18125830 未加载
feydaykyn超过 6 年前
There&#x27;s no pricing available for the enterprise edition, does someone know (roughly) how much we are talking about? Thanks!
评论 #18125493 未加载