Open takahashi-jo opened 6 months ago
I am also running intp the same issue in which the pods can get spun up torn down correctly but no logs are streamed. I am using EKS cluster that are in different vpc but the source can obviously access the target if it can spin up the pods but maybe there are some other communications needed? I have 443 to the target cluster api open from the source via the security group and the source cluster is in a private network with no access.
I was also able to use my own pod on the source cluster that uses the target cluster secret and it's also able to get the logs off the target system.
I noticed in the controller-manager pod the following message which looks to be the cause
main.go:329] timed out waiting for virtual kubelet serving certificate to be signed, pod logs/exec won't be supportedmain.go:329] timed out waiting for virtual kubelet serving certificate to be signed, pod logs/exec won't be supported
@takahashi-jo this might be related to https://github.com/admiraltyio/admiralty/issues/120
Scenario
Problem Description
I've successfully managed to deploy pods from a source cluster to a target cluster using the following Job configuration:
Source Cluster:
Target Cluster:
While I can successfully access the pod logs in the target cluster, attempting to do so in the source cluster results in a connection refused error.
Source Cluster:
Target Cluster:
I'm able to access the logs in the target cluster without any issues, which suggests that the deployment and pod execution were successful. However, accessing the logs from the source cluster does not work as expected.
Could this issue be related to a specific Admiralty configuration or perhaps a networking restriction within my Kubernetes setup? Any advice or guidance on troubleshooting this issue would be greatly appreciated.