-
Notifications
You must be signed in to change notification settings - Fork 827
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Blocked from APT repository by CloudFront #6106
Comments
cc @kubernetes/release-engineering |
/area infra/aws |
@ameukam: The label(s) In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
@kubernetes/sig-k8s-infra can we tweak the cloudfront config somehow to avoid issues like that? |
The infra for pkgs.k8s.io is maintained by SIG Release. I searched WAF logs for provided IP addresses and I was able to find that your requests are being blocked by the The AWS doc on WAF rules says that this is because your IP address has been identified as a bot and is blocked because of that. Do you have some other workload that might, for example, scrape resources hosted on AWS? Just trying to download packages, even if it's multiple nodes behind a NAT, shouldn't really trigger this. However, we should check with the AWS folks how to prevent this and what are recommended next steps (this is mostly like going to wait the next week because a lot of folks are on holidays). I'll take a look into this. |
NYU is a research university. Our students and faculty conduct all sort of research activities out of our compute infrastructure. If that can lead to our university being blocked from accessing your package repository, maybe you should consider whether this reputation/firewall service is really appropriate for a "community" repository? For an opensource project? Is there any way to know what/when/who would have angered the AWS algorithms that apparently gate-keep the access to Kubernetes releases? Is there any recourse for the people affected short of "abide to the unwritten rules of AWS"? I am sure you understand how much more community-friendly the Google-operated repository now seems to be, compared to this commercial repository that you call "community" but is apparently entirely gated by the goodwill of the Amazon corporation. |
Is the WAF needed in practice? Are there spam activities that require the WAF to reduce the cost on the repository? I am sure it is enabled for a reason, I am trying to understand. Would it help if we set up our own mirror? Is there a way to do that to remove CloudFront from the path? |
@remram44 regarding this:
and this comment on #5617:
This is not a "supposed" community repository, this is infrastructure funded by donations, managed and budgeted by community volunteers. The project has limited resources and we try to shield them from any potential abuse. We want to accommodate any fair use of our artifacts and some of the traffic patterns of the repos are just becoming apparent as the traffic has now begun pounding the new repositories. This means that now that we are uncovering edge cases like this one, we would appreciate your help understanding the traffic coming from your IP ranges to help us decide how to serve you better. The WAF configuration is public if you want to help us debug and/or suggest improvements. |
https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-ip-rep.html In addition to what @puerco mentioned:
|
If they have a machine that's outside that subnet and not blocked by AWS/CloudFront, setting up their own mirror would be the best solution at this time for this particular problem. They can use |
Hello, I have the same issue since fews days or weeks from all ips in 5.149.176.0/20 range. Thank you in advance. Regards |
/unassign |
In addition to the comments above #6106 (comment) #6106 (comment) #6106 (comment)
It is very common for universities to host package mirrors for OSS packages, I would recommend considering this here.
I'm sorry, we can't answer this. |
On multiple occasions over the past week, for multiple IP addresses, I am getting an error message from CloudFront when I try to use the APT repository.
Example Sunday:
Again today:
text for searchability purposes
The specific URL: https://pkgs.k8s.io/core:/stable:/v1.27/deb/InRelease (302 redirect to
https://prod-cdn.packages.k8s.io/repositories/isv:/kubernetes:/core:/stable:/v1.27/deb/InRelease
which serves the page above with status 403)This prevents me from deploying Kubernetes on nodes via Ansible and will probably impact cluster upgrades. This is a 40-node cluster at New York University that is behind NAT. The NAT uses multiple IP addresses but they are all getting blocked really quickly.
Example IPs: 216.165.12.8, 216.165.12.11
We never had this problem with the Google repository, only the so-called "community" repository.
Related:
prod-cdn.packages.k8s.io
CloudFront distribution #5617The text was updated successfully, but these errors were encountered: