Also having problems with tcpdump

Hi,
Like the previous post I also have a question about LFS258, Lab 3.4. - Deploy a Simple Application. I am using AWS and my kubeadm version is 1.20.
As per the lab sessions I have 2 nodes:
$ kubectl get nodes NAME STATUS ROLES AGE VERSION ip-172-31-17-67 Ready control-plane,master 9d v1.20.5 ip-172-31-27-81 Ready <none> 9d v1.20.5
and I have successfully deployed nginx to the worker node and exposed the service on port 80,
as per instructions 14-15.
$ kubectl get nodes NAME STATUS ROLES AGE VERSION ip-172-31-17-67 Ready control-plane,master 9d v1.20.5 ip-172-31-27-81 Ready <none> 9d v1.20.5 $ kubectl get deployments,pods NAME READY UP-TO-DATE AVAILABLE AGE deployment.apps/nginx 1/1 1 1 4d22h NAME READY STATUS RESTARTS AGE pod/nginx-7848d4b86f-pkw86 1/1 Running 0 55m $ kubectl get ep nginx NAME ENDPOINTS AGE nginx 192.168.14.138:80 55m
Now from the worker node I can get the sample nginx page served up,
so from the machine at 172.31.27.81 I can do:
$ curl 192.168.14.138:80 <!DOCTYPE html> <html> <head> ...
But when I try tcpdump
I don't see any traffic on the worker node (i even eventually tried issuing it from the control plane node, that is the machine with TCP/IP address of 172.31.17.67)
I tried:-
$ sudo tcpdump -i tunl0 tcpdump: tunl0: That device is not up
and then tcpdump -v
without a specific tunnel...
$ sudo tcpdump -v tcpdump: listening on vxlan.calico, link-type EN10MB (Ethernet), capture size 262144 bytes ^C 0 packets captured 0 packets received by filter 0 packets dropped by kernel
but it did not capture any traffic even though I issued several curl 192.168.14.138:80
commands in another session on the same
worker machine.
I also did note that when I issued curl 192.168.14.138:80
on the control plane, I got no HTTP response.
What should I check and what am I doing wrong?
Comments
-
BTW: I noticed that the person from the previous post, jcremp77 basically said:
Okay...It appears to be a GCP FW rule. Opened up all for internal communication and it works.
but this does not appear to be the source of my problem. Both AWS EC2 instances I am using have the following security:
Inbound rules: Type Protocol Port range Source All traffic All All 0.0.0.0/0 All traffic All All ::/0 Outbound rules: Type Protocol Port range Destination All traffic All All 0.0.0.0/0
So, as you can see traffic is not restricted in any way.
0 -
Hi tatty- Does PING work between both the tunl0 interfaces (master <--> worker)? Issue the command 'ip a' to get the list of your network interfaces on both master and worker, and take note of the 'tunl0' ip addresses. Try to ping from master to worker or vice versa. These interfaces 'must' be able to communicate or it will not work. Calico builds tunnels between the master and worker on these interfaces. It has been awhile since doing anything in AWS, but I remember that there are 2 different methods for controlling access into and within AWS. Network rules and FW rules (statelss and stateful respectively). Network is for traffic entering and exiting the VPC itself, not within the VPC. Hope this helps.
0 -
OK, after some research I found out that:
"Each EC2 instance performs source/destination checks by default. This means that the instance must be the source or destination of any traffic it sends or receives. However, a NAT [Network Address Translation] instance must be able to send and receive traffic when the source or destination is not itself. Therefore, you must disable source/destination checks on the NAT instance."
Source: https://docs.projectcalico.org/reference/public-cloud/awsThis in turn points to an AWS document that tells you how to actually disable that check through the AWS console interface, see https://docs.aws.amazon.com/vpc/latest/userguide/VPC_NAT_Instance.html#EIP_Disable_SrcDestCheck. (This document also tells you how to do it via the AWS CLI... but I am not using that.)
I see that the course documentation on how to provision AWS environment is a few years old now... maybe it's time to update it with this information.
0 -
Were you able to get it working?
0 -
Yes, I had to do a
sudo kubeadm reset
on both the control plane and worker node though and reapply everything.0 -
Good, glad you got it working.
0
Categories
- All Categories
- 50 LFX Mentorship
- 103 LFX Mentorship: Linux Kernel
- 575 Linux Foundation IT Professional Programs
- 304 Cloud Engineer IT Professional Program
- 125 Advanced Cloud Engineer IT Professional Program
- 53 DevOps Engineer IT Professional Program
- 60 Cloud Native Developer IT Professional Program
- 5 Express Training Courses
- 5 Express Courses - Discussion Forum
- 2K Training Courses
- 19 LFC110 Class Forum
- 7 LFC131 Class Forum
- 27 LFD102 Class Forum
- 157 LFD103 Class Forum
- 20 LFD121 Class Forum
- 1 LFD137 Class Forum
- 61 LFD201 Class Forum
- 1 LFD210 Class Forum
- LFD210-CN Class Forum
- 1 LFD213 Class Forum - Discontinued
- 128 LFD232 Class Forum
- LFD237 Class Forum
- 23 LFD254 Class Forum
- 611 LFD259 Class Forum
- 105 LFD272 Class Forum
- 1 LFD272-JP クラス フォーラム
- 1 LFD273 Class Forum
- 2 LFS145 Class Forum
- 24 LFS200 Class Forum
- 739 LFS201 Class Forum
- 1 LFS201-JP クラス フォーラム
- 11 LFS203 Class Forum
- 75 LFS207 Class Forum
- 300 LFS211 Class Forum
- 54 LFS216 Class Forum
- 47 LFS241 Class Forum
- 41 LFS242 Class Forum
- 37 LFS243 Class Forum
- 11 LFS244 Class Forum
- 36 LFS250 Class Forum
- 1 LFS250-JP クラス フォーラム
- LFS251 Class Forum
- 140 LFS253 Class Forum
- LFS254 Class Forum
- 1.1K LFS258 Class Forum
- 10 LFS258-JP クラス フォーラム
- 93 LFS260 Class Forum
- 132 LFS261 Class Forum
- 33 LFS262 Class Forum
- 80 LFS263 Class Forum
- 15 LFS264 Class Forum
- 11 LFS266 Class Forum
- 18 LFS267 Class Forum
- 17 LFS268 Class Forum
- 23 LFS269 Class Forum
- 203 LFS272 Class Forum
- 1 LFS272-JP クラス フォーラム
- LFS274 Class Forum
- LFS281 Class Forum
- 234 LFW211 Class Forum
- 172 LFW212 Class Forum
- 7 SKF100 Class Forum
- SKF200 Class Forum
- 902 Hardware
- 219 Drivers
- 74 I/O Devices
- 44 Monitors
- 115 Multimedia
- 209 Networking
- 101 Printers & Scanners
- 85 Storage
- 763 Linux Distributions
- 88 Debian
- 66 Fedora
- 15 Linux Mint
- 13 Mageia
- 24 openSUSE
- 142 Red Hat Enterprise
- 33 Slackware
- 13 SUSE Enterprise
- 357 Ubuntu
- 479 Linux System Administration
- 41 Cloud Computing
- 70 Command Line/Scripting
- Github systems admin projects
- 95 Linux Security
- 78 Network Management
- 108 System Management
- 49 Web Management
- 68 Mobile Computing
- 23 Android
- 30 Development
- 1.2K New to Linux
- 1.1K Getting Started with Linux
- 537 Off Topic
- 131 Introductions
- 217 Small Talk
- 21 Study Material
- 826 Programming and Development
- 278 Kernel Development
- 514 Software Development
- 928 Software
- 260 Applications
- 184 Command Line
- 3 Compiling/Installing
- 76 Games
- 316 Installation
- 62 All In Program
- 62 All In Forum
Upcoming Training
-
August 20, 2018
Kubernetes Administration (LFS458)
-
August 20, 2018
Linux System Administration (LFS301)
-
August 27, 2018
Open Source Virtualization (LFS462)
-
August 27, 2018
Linux Kernel Debugging and Security (LFD440)