-
Notifications
You must be signed in to change notification settings - Fork 40.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Service-environment variables should be optional #60099
Comments
/sig node |
I like the idea of making those environment variables optional. I think it could be managed by a flag provided to kubelet ( I like the idea about exposing information about services in downward API as well, but that sounds like a very complicated feature, which would need to involve teaching downward API to select external resources by label selectors. IMO it definitely needs a separate issue and feature request in the community repo. |
I would imaging this being nicer to have at the pod-definition, or maybe as an attribute? I can see this being useful some times, but I rather want it default off. I don't know the inner details so say either way, nor have I ever used those variables to say if really when they are useful. Do people even use kubernetes without a dns controller of some sort (in other words, is this needed at all)? |
An attribute seems to be better, at least for the first implementation - it will not require any API changes. |
/sig network |
@xeor what is the use case for disabling these environment variables, security ? |
@krmayankk I wouldn't say that there is any specific usecase. They're just not needed. I'd say that currently Kubernetes users should access services by using DNS and there is no need for keeping IP addresses and ports in environment variables. The pattern of having those variables is an old behavior of Docker ( |
Service env variables shouldn't bring any security issues though, they're limited by the namespace. So I think it's fine to leave them optionally for legacy app users who are used to accessing services by variables, not by DNS. |
@krmayankk there is not really a specific usecase as @mrostecki said.. It is more or less the reason that they are not needed. Even tho not really security related, it also exposed a lot of info about whats in it's namespace. |
IMO if there is no real use case we shouldnt yet remove these environment variables. The primary reason being they are an excellent way for primitive service discovery for pods untill we have some other better way which is available in the default configuration . DNS is not available to kubernetes users by default and i would think by default we want to make it easy for our customers to use kubernetes. @thockin might have some thoughts here . |
@krmayankk #18219 is one reason to allow them to be disabled. |
I came here after hours of debugging why a node app using Swagger library was generating his own URI as mydomain.tld:tcp://10.97.1.1:8082 |
@eroldan, I am having a similar issue. My app uses REDIS_PORT to connect to a redis database. Since the variable set by docker uses the tcp://IP:PORT format, i get the following error: "unable to connect to tcp://redis:tcp://10.0.151.188:6379" I believe having an option to disable the env variables would be a good solution to this problem. |
We have use case, some apps (libs) try to pass all available environment variables further downstream via arguments, and when we get to a certain number of containers in the cluster, it'd start to crash with |
@alexindigo I had a similar issue with fcgi/php-fom and the workaround has been to unset all env variables before running it :-/
|
Thanks @dynek, looks like this what I'd have to resort to. Hope there won't be naming conflicts. :) |
I would like to +1 this, and validate the use case that they can cause code that runs perfectly fine locally to fail on k8s, due to env variables being quite commonly named they end up clashing with many scripts. We need to be able to either turn them off, or have them prefixed with |
Same issue as @alkin. Just spent quite a while working out why I was getting an error for my redis.port property in my Java containers when I wasn't setting it. I guess I'll rename my redis service to something other than "redis". 😞 |
same issue, when using zeppelin for docker, because zeppelin search for server port from environment variable named "port", which is integer value from ZeppelinConfiguration.java, but from k8s, it's value is tcp://10.43.210.57:8080, this will cause NumberFormatException |
oof, finally found this after hours of debugging, i am running a docker registry and the auth service is called "registry-auth" therefore creates a bunch of env vars that the container things are config values, super annoying to debug and since the advent of kube-dns it seems a bit superfluous |
I'm confused that this is closed. I don't expect environment variables in my container that I didn't explicitly set. Has this feature request been implemented in k8s now? Thanks. |
@vincentjorgensen totally agree with you. I have to use various namespaces to reduce impact of this feature. |
The issue was fixed in new versions of kube. See #68754 |
Awesome @huggsboson. It doesn't seem to be in v1.12.0. Is is staged for a future release? |
It looks like it was merged 14 days ago, so I'd expect it to be in the next release unless someone back ports it. |
@bradhoekstra Does it make sense / is it possible to back port this feature to previous releases given the number of people wanting the new behavior? |
@huggsboson My understanding is that new features are limited to minor releases; patch releases should be bug fix only. Since this didn't make it into 1.12 it will wait until 1.13. |
@bradhoekstra Based on the comments, one could argue this is a "bug fix" (for a bug that has existed since the beginning of time). I'm curious if it would be easy to backport or if code changes landing in the 1.13 timeframe made it easier to accomplish. |
AFAIK, it would be easy to backport. |
@bradhoekstra Is there a chance this could be reported back as a bug and the change backported as a bug fix to previous releases? |
@nrvnrvn IMO, this change does not meet the criteria for being cherry-picked into a patch release as they are laid out: https://github.com/kubernetes/community/blob/master/contributors/design-proposals/release/versioning.md For reference, the process for requesting a cherry pick is documented here: https://github.com/kubernetes/community/blob/master/contributors/devel/cherry-picks.md |
What's really frustrating is the only service vars that seem to be documented are $service_SERVICE_HOST and $service_SERVICE_PORT, when in fact there are lots of others that look like $service_PORT*. Can someone explain these or point to some docs that I was unable to find? |
@bradhoekstra thanks! Not sure how I missed this. Will definitely be nice when we can disable exposing those vars. |
Is this a BUG REPORT or FEATURE REQUEST?:
/kind feature
What happened:
Every container gets ~8 environmentvariables per service exposing a lot of information, and there is no way to turn it off.
What you expected to happen:
This
docker
deprecated--link
feature compatibility option to be an opt-in (or at least opt-out) option.How to reproduce it (as minimally and precisely as possible):
Create a new container in a cluster where there are existing services. Check the
env
. You should see something like:Anything else we need to know?:
The code doing this is https://github.com/kubernetes/kubernetes/blob/v1.9.3/pkg/kubelet/kubelet_pods.go#L551-L553, and some docs at https://kubernetes.io/docs/concepts/containers/container-environment-variables/.
Maybe things like this should be exposed using eg the downwards api instead (https://kubernetes.io/docs/tasks/inject-data-application/downward-api-volume-expose-pod-information/)
Environment:
kubectl version
):uname -a
):The text was updated successfully, but these errors were encountered: