Closed hobbsh closed 6 years ago
@hobbsh I have tested CNI using ubuntu in KOP cluster. Can you check iptables -nvL
and see where packet is dropped? Have enabled forwarding
for IPv4 traffic?
I was starting to suspect iptables as well and it looks like the Forward chain is set to DROP, despite having sudo iptables -P FORWARD ACCEPT
in the AMI script and my saved rules looked right. Running that manually on the host solved the problem. I will fix my AMI script and iptables-persistence - it may also be that iptables-restore
was not run on boot in which case its an issue with my script still. Thank you for your quick reply!
# Generated by iptables-save v1.6.0 on Tue Aug 14 20:06:51 2018
*filter
:INPUT ACCEPT [10:1360]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [10:772]
COMMIT
# Completed on Tue Aug 14 20:06:51 2018
I've been trying to make an Ubuntu worker work with EKS and it has come down to this last hurdle which I believe is related to this CNI. Basically, any pods not running with
hostNetwork: true
have no network connectivity. I have AL2 workers running alongside and they are all fine. I have anaws-cni-support.tar.gz
ready.So, in this scenario, an Ubuntu worker can join the cluster because
aws-node
andkube-proxy
both run withhostNetwork: true
.I see connectivity errors in the pods that don't use
hostNetwork
: