On 11/02/2015 04:40 PM, Brandon Philips wrote:
> Kubernetes's solution to the "getting traffic into the cluster" problem with the concept of a NodePort. Basically, a service with
> type of NodePort will expose a known port on every "worker node" in the cluster. This can then be used to route traffic to the
> cluster from an F5, ELB, etc.
>
How do you stop the load balancer from becoming a single point of failure? I will be putting some worker nodes
at separate physical providers. No private network connects them since they are with different companies as well as
physically separate.
Is it necessary to do all of this with connecting VPN tunnels? If so, how do you stop the VPN tunnel setup from becoming a single
point of failure?
I'd like to see a secure way of doing clusters' etcd2 communication relying on redundant DNS of some kind, even if it meant DNS
publishing the IP of an etcd2 node. Workers naturally have a public facing IP, but they should have the same secure and redundant
way of communicating between the etcd2 nodes.
Can this all be done now without a single point of failure?