Lab 9.2 curl
I'm following lab 9.2. I have the nginx deployment, and I set up the NodePort service the way the lab told me to. However, the lab says I should be able successfully curl my controlplane endpoint with the NodePort IP and it does not work for me. I'm logged into my control plane node. The pods are running on my worker node. From my CP node, I can successfully curl the following:
- The worker node's private IP and nodeport
- The worker node's public IP and nodeport
However, the following curl commands will time out: - Control plane endpoint (public Azure Load Balancer which is forwarding the nodeport to the backend pool)
- The private IP of the control plane node and the nodeport
- The public IP of the control plane node and the nodeport.
Running the commands from the worker node doesn't make a difference either.
I tried allowing all traffic in my Azure Network Security Group attached to my subnet and that didn't help.
This feels like a problem with my cluster, but I'm not sure what it would be. Any guidance or thoughts?
Best Answer
-
Hello,
Indeed when using a properly configured network one would be able to connect to a NodePort on any node in a cluster and the network plugin and kube-proxy would ensure the traffic is sent to a node with a pod of matching label and connected to a particular port of a pod.
There is a reason we do not support labs that are running on Azure. Also, if you add or remove steps your lab outcomes will probably be different.
Regards,
0
Answers
-
Hi @brianmoore,
Since Azure networking is less seamless in comparison to AWS, GCP, and even local type 2 hypervisors, the Azure cloud infrastructure is not recommended nor supported for this class. However, you may be able to find a few forum discussions where students have documented possible solutions around the challenges faced when running these lab exercises on Azure.
However, to help isolate the root cause, let's try to determine if your cluster is properly configured. Is the CP node tainted? Was the workload ever deployed to the CP node? If you scale the nginx deployment to 10 or 20 replicas, are any of the replicas assigned to the CP node? Are all the control plane pods running in the cluster?
Regards,
-Chris0 -
Thank you for your help! The CP is tainted, and all its infrastructure pods are running. The nginx workload was never deployed to the CP node. 2 pods are running on my worker. I scaled the deployment to 20 and all 20 pods still run on the worker.
I searched the forums like you recommended and it does seem like Calico won't work on Azure. Ugh.
I do plan to convert my Terraform to AWS at some point, but for the CKA exam my voucher and course are going to expire in 30 days, so it's a tight window for me (and I already was granted a complimentary extension, so I guess this is my last chance).
Maybe I could do the conversion to AWS without too much trouble, I just hope it doesn't interfere with me getting ready for the exam in time.
0 -
Hi @brianmoore,
The taint is the reason why your pods only run on the worker node. In case it was missed earlier, Step 3 of Lab 3.3 describes the taint removal process. Once removed, your pods should be distribute evenly between the two nodes (cp and worker).
However, the
curl
issues may still persist on Azure. On EC2 with fully open VPC SG, or on GCE with fully open VPC Firewall rule,curl
should work as expected.As you made progress through the course, did you notice any discrepancies or similar connectivity issues in any of the prior chapters?
Regards,
-Chris0 -
Ah, I see. I do remember that taint removal process. I didn't realize I was supposed to permanently remove my CP's taint, because I figured that the pods should generally just run on the worker and not the CP. And yes, I did get the same confusion in Lab 3.4 when I created a ClusterIP but I wasn't able to curl it from the CP.
Theoretically, though (and disregarding the crappy Azure networking)... if all my pods are deployed to the worker, and I have a nodeport service, then should I be able to curl my control plane node's public IP address and the node port, and then the nodeport service would forward the traffic to the worker node's endpoint? Maybe I'm just misunderstanding how the NodePort service works. I thought that every node listens on that same high-number random port and then forwards the traffic to the nginx pod on the worker. Please correct me if I'm wrong.
0
Categories
- 10.1K All Categories
- 35 LFX Mentorship
- 88 LFX Mentorship: Linux Kernel
- 504 Linux Foundation Boot Camps
- 279 Cloud Engineer Boot Camp
- 103 Advanced Cloud Engineer Boot Camp
- 48 DevOps Engineer Boot Camp
- 41 Cloud Native Developer Boot Camp
- 2 Express Training Courses
- 2 Express Courses - Discussion Forum
- 1.7K Training Courses
- 17 LFC110 Class Forum
- 5 LFC131 Class Forum
- 19 LFD102 Class Forum
- 148 LFD103 Class Forum
- 12 LFD121 Class Forum
- 61 LFD201 Class Forum
- LFD210 Class Forum
- 1 LFD213 Class Forum - Discontinued
- 128 LFD232 Class Forum
- 23 LFD254 Class Forum
- 569 LFD259 Class Forum
- 100 LFD272 Class Forum
- 1 LFD272-JP クラス フォーラム
- 1 LFS145 Class Forum
- 23 LFS200 Class Forum
- 739 LFS201 Class Forum
- 1 LFS201-JP クラス フォーラム
- 1 LFS203 Class Forum
- 45 LFS207 Class Forum
- 298 LFS211 Class Forum
- 53 LFS216 Class Forum
- 46 LFS241 Class Forum
- 41 LFS242 Class Forum
- 37 LFS243 Class Forum
- 10 LFS244 Class Forum
- 27 LFS250 Class Forum
- 1 LFS250-JP クラス フォーラム
- 131 LFS253 Class Forum
- 995 LFS258 Class Forum
- 10 LFS258-JP クラス フォーラム
- 87 LFS260 Class Forum
- 126 LFS261 Class Forum
- 31 LFS262 Class Forum
- 79 LFS263 Class Forum
- 15 LFS264 Class Forum
- 10 LFS266 Class Forum
- 17 LFS267 Class Forum
- 17 LFS268 Class Forum
- 21 LFS269 Class Forum
- 200 LFS272 Class Forum
- 1 LFS272-JP クラス フォーラム
- 212 LFW211 Class Forum
- 153 LFW212 Class Forum
- 899 Hardware
- 217 Drivers
- 74 I/O Devices
- 44 Monitors
- 115 Multimedia
- 208 Networking
- 101 Printers & Scanners
- 85 Storage
- 749 Linux Distributions
- 88 Debian
- 64 Fedora
- 14 Linux Mint
- 13 Mageia
- 24 openSUSE
- 133 Red Hat Enterprise
- 33 Slackware
- 13 SUSE Enterprise
- 355 Ubuntu
- 473 Linux System Administration
- 38 Cloud Computing
- 69 Command Line/Scripting
- Github systems admin projects
- 94 Linux Security
- 77 Network Management
- 108 System Management
- 49 Web Management
- 63 Mobile Computing
- 22 Android
- 27 Development
- 1.2K New to Linux
- 1.1K Getting Started with Linux
- 528 Off Topic
- 127 Introductions
- 213 Small Talk
- 20 Study Material
- 794 Programming and Development
- 262 Kernel Development
- 498 Software Development
- 922 Software
- 257 Applications
- 182 Command Line
- 2 Compiling/Installing
- 76 Games
- 316 Installation
- 53 All In Program
- 53 All In Forum
Upcoming Training
-
August 20, 2018
Kubernetes Administration (LFS458)
-
August 20, 2018
Linux System Administration (LFS301)
-
August 27, 2018
Open Source Virtualization (LFS462)
-
August 27, 2018
Linux Kernel Debugging and Security (LFD440)