Open gthieleb opened 3 years ago
Update: It seems port 4648 was missing too. In my previous tests I did not recognized that because I had previously allow-all
inside the security group enabled.
Oct 02 12:44:49 ip-10-10-10-69 nomad[4129]: 2021-10-02T12:44:49.396Z [ERROR] nomad: error looking up Nomad servers in Consul: error="contacted 0 Nomad Servers: 2 errors occurred:
Oct 02 12:44:49 ip-10-10-10-69 nomad[4129]: * Failed to join 10.10.10.38: dial tcp 10.10.10.38:4648: i/o timeout
Oct 02 12:44:49 ip-10-10-10-69 nomad[4129]: * Failed to join 10.10.10.14: dial tcp 10.10.10.14:4648: i/o timeout
I have an issue when using the "security group" module, when the incoming_cidr is adpated to a custom IP addr (st. else then 0.0.0.0/0).
My ASG is created with help of the
terraform-aws-modules/terraform-aws-autoscaling
module using custom userdata and ubuntu 20.04. The userdata incorporates the hashicorp repos and performs a default installation of nomad and consul:userdata script:
/etc/nomad.d/nomad.hcl:
/etc/consul.d/consul.hcl:
When opening the browser I see the following message:
In the nomad logs it shows:
sudo journalctl -t nomad:
It seems that the communication for port 4647 is currently not allowed within the security group.
Trying to access the port of a server node from another server node times out:
After allowing port 4647 communication within the security group the cluster server nodes starts replicate with each other:
Question for me is if port 4647 is new or only missing in the security groups module?
The config from a installation using the root module differs slightly but I can't see any pinning to another port:
/opt/nomad/config/default.hcl: