Skip to content
This repository has been archived by the owner on Jun 13, 2022. It is now read-only.

Internal DNS doesn't work on a newly added node #27

Open
user-name-is-taken opened this issue Sep 30, 2020 · 5 comments
Open

Internal DNS doesn't work on a newly added node #27

user-name-is-taken opened this issue Sep 30, 2020 · 5 comments

Comments

@user-name-is-taken
Copy link

user-name-is-taken commented Sep 30, 2020

After adding a third worker node with kubicctl node add <node name> I can't reach services running inside the cluster from pods running on the new node. To fix this I deleted the new node, so unfortunately I can't provide logs. If you can't reproduce this issue feel free to close it.

@0pendev
Copy link
Contributor

0pendev commented Dec 5, 2020

Deployed a working kubic cluster today and I did not have the issue. Can you provide more info ?
Release of kubic, CNI in use, types of services etc

@thkukuk
Copy link
Owner

thkukuk commented Dec 7, 2020

Sure that you used the defaults and not flannel? This is something we see regular with flannel, but never with weave.

@user-name-is-taken
Copy link
Author

$ kubectl get daemonset -n kube-system
NAME         DESIRED   CURRENT   READY   UP-TO-DATE   AVAILABLE   NODE SELECTOR            AGE
kube-proxy   3         3         3       3            3           kubernetes.io/os=linux   151d
kured        3         3         0       3            0           <none>                   151d
weave-net    3         3         3       3            3           <none>                   151d

# kubicctl version
kubicctl version 0.10.2

$ kubectl get nodes -o wide
NAME             STATUS   ROLES    AGE    VERSION   INTERNAL-IP     EXTERNAL-IP   OS-IMAGE           KERNEL-VERSION     CONTAINER-RUNTIME
install          Ready    master   151d   v1.18.9   x.x.x.x   <none>        openSUSE MicroOS   5.8.10-1-default   cri-o://1.19.0
localhost        Ready    <none>   151d   v1.18.9   x.x.x.x    <none>        openSUSE MicroOS   5.8.10-1-default   cri-o://1.19.0
updated-node-2   Ready    <none>   151d   v1.18.9   x.x.x.x    <none>        openSUSE MicroOS   5.8.10-1-default   cri-o://1.19.0

$ kubectl get ns
NAME                      STATUS   AGE
default                   Active   151d
grafana                   Active   137d
harbor                    Active   63d
imagepullsecret-patcher   Active   96d
keycloak                  Active   149d
kube-node-lease           Active   151d
kube-public               Active   151d
kube-system               Active   151d
linkerd                   Active   63d
loki                      Active   83d
metallb-system            Active   151d
rook-ceph                 Active   87d
traefik-system            Active   150d
vault                     Active   52d

@0pendev
Copy link
Contributor

0pendev commented Dec 9, 2020

And for example, what is the service that you can't access here ?

@user-name-is-taken
Copy link
Author

user-name-is-taken commented Dec 13, 2020

If I added a node to that cluster I wouldn't be able to ping any pods running on the new node or ping anything from the pods running on the new nodes.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants