Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Service-environment variables should be optional #60099

Closed
xeor opened this issue Feb 20, 2018 · 38 comments · Fixed by #68754
Closed

Service-environment variables should be optional #60099

xeor opened this issue Feb 20, 2018 · 38 comments · Fixed by #68754
Labels
kind/feature Categorizes issue or PR as related to a new feature. sig/network Categorizes an issue or PR as relevant to SIG Network. sig/node Categorizes an issue or PR as relevant to SIG Node.

Comments

@xeor
Copy link

xeor commented Feb 20, 2018

Is this a BUG REPORT or FEATURE REQUEST?:

/kind feature

What happened:
Every container gets ~8 environmentvariables per service exposing a lot of information, and there is no way to turn it off.

What you expected to happen:
This docker deprecated --link feature compatibility option to be an opt-in (or at least opt-out) option.

How to reproduce it (as minimally and precisely as possible):
Create a new container in a cluster where there are existing services. Check the env. You should see something like:

/ # env | grep KUBERNETES
KUBERNETES_SERVICE_PORT=443
KUBERNETES_PORT=tcp://10.233.0.1:443
KUBERNETES_PORT_443_TCP_ADDR=10.233.0.1
KUBERNETES_PORT_443_TCP_PORT=443
KUBERNETES_PORT_443_TCP_PROTO=tcp
KUBERNETES_PORT_443_TCP=tcp://10.233.0.1:443
KUBERNETES_SERVICE_PORT_HTTPS=443
KUBERNETES_SERVICE_HOST=10.233.0.1

# one ingress-controller
/ # env | grep INGRESS_NGINX_EXT | wc -l
36

Anything else we need to know?:
The code doing this is https://github.com/kubernetes/kubernetes/blob/v1.9.3/pkg/kubelet/kubelet_pods.go#L551-L553, and some docs at https://kubernetes.io/docs/concepts/containers/container-environment-variables/.

Maybe things like this should be exposed using eg the downwards api instead (https://kubernetes.io/docs/tasks/inject-data-application/downward-api-volume-expose-pod-information/)

Environment:

  • Kubernetes version (use kubectl version):
Client Version: version.Info{Major:"1", Minor:"9", GitVersion:"v1.9.3", GitCommit:"d2835416544f298c919e2ead3be3d0864b52323b", GitTreeState:"clean", BuildDate:"2018-02-09T21:51:06Z", GoVersion:"go1.9.4", Compiler:"gc", Platform:"darwin/amd64"}
Server Version: version.Info{Major:"1", Minor:"9", GitVersion:"v1.9.2+coreos.0", GitCommit:"b427929b2982726eeb64e985bc1ebb41aaa5e095", GitTreeState:"clean", BuildDate:"2018-01-18T22:56:14Z", GoVersion:"go1.9.2", Compiler:"gc", Platform:"linux/amd64"}
  • Cloud provider or hardware configuration: on-prem
  • OS (e.g. from /etc/os-release): ubuntu
  • Kernel (e.g. uname -a):
  • Install tools: helm
  • Others:
@k8s-ci-robot k8s-ci-robot added needs-sig Indicates an issue or PR lacks a `sig/foo` label and requires one. kind/feature Categorizes issue or PR as related to a new feature. labels Feb 20, 2018
@vadorovsky
Copy link

/sig node

@k8s-ci-robot k8s-ci-robot added sig/node Categorizes an issue or PR as relevant to SIG Node. and removed needs-sig Indicates an issue or PR lacks a `sig/foo` label and requires one. labels Feb 21, 2018
@vadorovsky
Copy link

vadorovsky commented Feb 21, 2018

I like the idea of making those environment variables optional. I think it could be managed by a flag provided to kubelet (--enable-service-env?).

I like the idea about exposing information about services in downward API as well, but that sounds like a very complicated feature, which would need to involve teaching downward API to select external resources by label selectors. IMO it definitely needs a separate issue and feature request in the community repo.

@xeor
Copy link
Author

xeor commented Feb 21, 2018

I would imaging this being nicer to have at the pod-definition, or maybe as an attribute? I can see this being useful some times, but I rather want it default off.

I don't know the inner details so say either way, nor have I ever used those variables to say if really when they are useful. Do people even use kubernetes without a dns controller of some sort (in other words, is this needed at all)?

@vadorovsky
Copy link

I would imaging this being nicer to have at the pod-definition, or maybe as an attribute?

An attribute seems to be better, at least for the first implementation - it will not require any API changes.

@vadorovsky
Copy link

/sig network

@k8s-ci-robot k8s-ci-robot added the sig/network Categorizes an issue or PR as relevant to SIG Network. label Feb 22, 2018
@krmayankk
Copy link

@xeor what is the use case for disabling these environment variables, security ?

@vadorovsky
Copy link

@krmayankk I wouldn't say that there is any specific usecase. They're just not needed. I'd say that currently Kubernetes users should access services by using DNS and there is no need for keeping IP addresses and ports in environment variables.

The pattern of having those variables is an old behavior of Docker (--link option, which is deprecated FWIK) and docker-compose.

@vadorovsky
Copy link

Service env variables shouldn't bring any security issues though, they're limited by the namespace. So I think it's fine to leave them optionally for legacy app users who are used to accessing services by variables, not by DNS.

@xeor
Copy link
Author

xeor commented Feb 22, 2018

@krmayankk there is not really a specific usecase as @mrostecki said.. It is more or less the reason that they are not needed. Even tho not really security related, it also exposed a lot of info about whats in it's namespace.
Felt like it was bloating up my pods env as well. everything from 0 to 6-8 entries per other pod in the namespace.

@krmayankk
Copy link

IMO if there is no real use case we shouldnt yet remove these environment variables. The primary reason being they are an excellent way for primitive service discovery for pods untill we have some other better way which is available in the default configuration . DNS is not available to kubernetes users by default and i would think by default we want to make it easy for our customers to use kubernetes. @thockin might have some thoughts here .

@huggsboson
Copy link
Contributor

@krmayankk #18219 is one reason to allow them to be disabled.

@eroldan
Copy link

eroldan commented Apr 13, 2018

I came here after hours of debugging why a node app using Swagger library was generating his own URI as mydomain.tld:tcp://10.97.1.1:8082
These environment variables can clash with variables of own program or libraries, mainly SERVICENAME_PORT kind, generating unexpected problems and wasting operator time.
Being a broke (because ordering) discovery mechanism, my opinion is that this feature should be optional. Being able to disable it in the Service kind will resolve the situation still providing backwards compatibility.

@alkin
Copy link

alkin commented Apr 26, 2018

@eroldan, I am having a similar issue. My app uses REDIS_PORT to connect to a redis database. Since the variable set by docker uses the tcp://IP:PORT format, i get the following error:

"unable to connect to tcp://redis:tcp://10.0.151.188:6379"

I believe having an option to disable the env variables would be a good solution to this problem.

@alexindigo
Copy link

We have use case, some apps (libs) try to pass all available environment variables further downstream via arguments, and when we get to a certain number of containers in the cluster, it'd start to crash with E2BIG and we're unable to start any new container. So ability to disable it will go a long way. Thank you.

@dynek
Copy link

dynek commented May 7, 2018

@alexindigo I had a similar issue with fcgi/php-fom and the workaround has been to unset all env variables before running it :-/

for i in $(set | grep "_SERVICE_\|_PORT" | cut -f1 -d=); do unset $i; done

@alexindigo
Copy link

Thanks @dynek, looks like this what I'd have to resort to. Hope there won't be naming conflicts. :)

@Stono
Copy link

Stono commented Jul 4, 2018

I would like to +1 this, and validate the use case that they can cause code that runs perfectly fine locally to fail on k8s, due to env variables being quite commonly named they end up clashing with many scripts.

We need to be able to either turn them off, or have them prefixed with K8S_

@cablespaghetti
Copy link

cablespaghetti commented Jul 20, 2018

Same issue as @alkin. Just spent quite a while working out why I was getting an error for my redis.port property in my Java containers when I wasn't setting it. I guess I'll rename my redis service to something other than "redis". 😞

@imwower
Copy link

imwower commented Jul 23, 2018

same issue, when using zeppelin for docker, because zeppelin search for server port from environment variable named "port", which is integer value from ZeppelinConfiguration.java, but from k8s, it's value is tcp://10.43.210.57:8080, this will cause NumberFormatException

@termie
Copy link

termie commented Sep 21, 2018

oof, finally found this after hours of debugging, i am running a docker registry and the auth service is called "registry-auth" therefore creates a bunch of env vars that the container things are config values, super annoying to debug and since the advent of kube-dns it seems a bit superfluous

@vincentjorgensen
Copy link

I'm confused that this is closed. I don't expect environment variables in my container that I didn't explicitly set. Has this feature request been implemented in k8s now? Thanks.

@yivo
Copy link

yivo commented Oct 8, 2018

@vincentjorgensen totally agree with you.

I have to use various namespaces to reduce impact of this feature.

@huggsboson
Copy link
Contributor

The issue was fixed in new versions of kube. See #68754

@vincentjorgensen
Copy link

The issue was fixed in new versions of kube. See #68754

Awesome @huggsboson. It doesn't seem to be in v1.12.0. Is is staged for a future release?

@huggsboson
Copy link
Contributor

It looks like it was merged 14 days ago, so I'd expect it to be in the next release unless someone back ports it.

@huggsboson
Copy link
Contributor

@bradhoekstra Does it make sense / is it possible to back port this feature to previous releases given the number of people wanting the new behavior?

@bradhoekstra
Copy link
Contributor

@huggsboson My understanding is that new features are limited to minor releases; patch releases should be bug fix only. Since this didn't make it into 1.12 it will wait until 1.13.

@huggsboson
Copy link
Contributor

huggsboson commented Oct 15, 2018

@bradhoekstra Based on the comments, one could argue this is a "bug fix" (for a bug that has existed since the beginning of time).

I'm curious if it would be easy to backport or if code changes landing in the 1.13 timeframe made it easier to accomplish.

@bradhoekstra
Copy link
Contributor

AFAIK, it would be easy to backport.

@nrvnrvn
Copy link

nrvnrvn commented Oct 26, 2018

@bradhoekstra Is there a chance this could be reported back as a bug and the change backported as a bug fix to previous releases?
It is actually easy to backport but other than a mere PR what steps should be made?

@bradhoekstra
Copy link
Contributor

@twbecker
Copy link

What's really frustrating is the only service vars that seem to be documented are $service_SERVICE_HOST and $service_SERVICE_PORT, when in fact there are lots of others that look like $service_PORT*. Can someone explain these or point to some docs that I was unable to find?

@twbecker
Copy link

@bradhoekstra thanks! Not sure how I missed this. Will definitely be nice when we can disable exposing those vars.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/feature Categorizes issue or PR as related to a new feature. sig/network Categorizes an issue or PR as relevant to SIG Network. sig/node Categorizes an issue or PR as relevant to SIG Node.
Projects
None yet