Skip to content

Update GMSA docs for beta in v1.16#16464

Closed
ddebroy wants to merge 2 commits intokubernetes:dev-1.16from
ddebroy:gmsa1
Closed

Update GMSA docs for beta in v1.16#16464
ddebroy wants to merge 2 commits intokubernetes:dev-1.16from
ddebroy:gmsa1

Conversation

@ddebroy
Copy link
Copy Markdown
Contributor

@ddebroy ddebroy commented Sep 19, 2019

Update to docs to reflect Beta state of GMSA feature in v1.16

@k8s-ci-robot k8s-ci-robot added the cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. label Sep 19, 2019
@k8sio-netlify-preview-bot
Copy link
Copy Markdown
Collaborator

k8sio-netlify-preview-bot commented Sep 19, 2019

Deploy preview for kubernetes-io-vnext-staging processing.

Building with commit 59b50d3

https://app.netlify.com/sites/kubernetes-io-vnext-staging/deploys/5d87d7dac9907900074c19ee

@k8s-ci-robot k8s-ci-robot added the size/S Denotes a PR that changes 10-29 lines, ignoring generated files. label Sep 19, 2019
@ddebroy
Copy link
Copy Markdown
Contributor Author

ddebroy commented Sep 19, 2019

/cc @wk8

@k8s-ci-robot k8s-ci-robot requested a review from wk8 September 19, 2019 21:47
@k8s-ci-robot k8s-ci-robot added language/en Issues or PRs related to English language sig/docs Categorizes an issue or PR as relevant to SIG Docs. labels Sep 19, 2019
@ddebroy
Copy link
Copy Markdown
Contributor Author

ddebroy commented Sep 19, 2019

/assign @gochist

Copy link
Copy Markdown
Contributor

@sftim sftim left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for the PR.

Here are a couple of bits of feedback.

{{< note >}}
Currently this feature is in alpha state. While the overall goals and functionality will not change, the way in which the GMSA credspec references are specified in pod specs may change from annotations to API fields. Please take this into consideration when testing or adopting this feature.
{{< /note >}}
In Kubernetes, GMSA credential specs are configured at a Kubernetes cluster-wide scope as custom resources. Windows pods, as well as individual containers within a pod, can be configured to use a GMSA for domain based functions (e.g. Kerberos authentication) when interacting with other Windows services. As of v1.16, Dockershim and the Docker runtime supports GMSA for Windows workloads end-2-end. Support for GMSA through CRI has been implemented but implementation of GMSA support in other runtimes like ContainerD is under investigation.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

“end-2-end”? I think I'd stop that sentence at “workloads”.

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Although the investigation (mentioned in the last sentence) is current, I feel it still comes under avoid statements about the future.

I recommend rewording that last sentence, to (eg):

You can use GMSA with runtimes that implement {{< glossary_tooltip term_id="cri" text="CRI" >}}.

Copy link
Copy Markdown
Contributor Author

@ddebroy ddebroy Sep 19, 2019

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

For now, I removed the CRI/containerd reference. Once that whole stack is functional (CRI + containerd/other runtimes on Windows with GMSA support), we can update things here. Right now (in the context of v1.16) I think this will create confusion for end-users.

Copy link
Copy Markdown

@wk8 wk8 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm
/approve

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Sep 19, 2019
Signed-off-by: Deep Debroy <ddebroy@docker.com>
@k8s-ci-robot
Copy link
Copy Markdown
Contributor

New changes are detected. LGTM label has been removed.

@k8s-ci-robot k8s-ci-robot removed the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Sep 19, 2019
Signed-off-by: Deep Debroy <ddebroy@docker.com>
Copy link
Copy Markdown

@wk8 wk8 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/approve

@k8s-ci-robot
Copy link
Copy Markdown
Contributor

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: wk8
To complete the pull request process, please assign gochist
You can assign the PR to them by writing /assign @gochist in a comment when ready.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@tengqm
Copy link
Copy Markdown
Contributor

tengqm commented Sep 23, 2019

Please rebase to master.

@gochist
Copy link
Copy Markdown
Contributor

gochist commented Sep 23, 2019

/unassign

{{< note >}}
Currently this feature is in alpha state. While the overall goals and functionality will not change, the way in which the GMSA credspec references are specified in pod specs may change from annotations to API fields. Please take this into consideration when testing or adopting this feature.
{{< /note >}}
In Kubernetes, GMSA credential specs are configured at a Kubernetes cluster-wide scope as custom resources. Windows pods, as well as individual containers within a pod, can be configured to use a GMSA for domain based functions (e.g. Kerberos authentication) when interacting with other Windows services. As of v1.16, Dockershim and the Docker runtime supports GMSA for Windows workloads.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

supports -> support
Dockershim and the Docker runtime support GMSA ...

@steveperry-53
Copy link
Copy Markdown
Contributor

@ddebroy, As @tengqm points out, this needs to be rebased to master. Other than that, these changes look good to me.

@ddebroy
Copy link
Copy Markdown
Contributor Author

ddebroy commented Sep 26, 2019

Thanks for the review. Will update and submit the PR against master then.

@ddebroy
Copy link
Copy Markdown
Contributor Author

ddebroy commented Sep 27, 2019

Submitted against master as #16579 with comments addressed from above.

@ddebroy ddebroy closed this Sep 27, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. language/en Issues or PRs related to English language sig/docs Categorizes an issue or PR as relevant to SIG Docs. size/S Denotes a PR that changes 10-29 lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

8 participants