Open jmtsi opened 4 months ago
Hi! Thanks for reporting the issue. Can you please let us know which version were you using prior to 2.7.2? Controller logs would also be helpful. Thanks!
The Kubernetes project currently lacks enough contributors to adequately respond to all issues.
This bot triages un-triaged issues according to the following rules:
lifecycle/stale
is appliedlifecycle/stale
was applied, lifecycle/rotten
is appliedlifecycle/rotten
was applied, the issue is closedYou can:
/remove-lifecycle stale
/close
Please send feedback to sig-contributor-experience at kubernetes/community.
/lifecycle stale
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues.
This bot triages un-triaged issues according to the following rules:
lifecycle/stale
is appliedlifecycle/stale
was applied, lifecycle/rotten
is appliedlifecycle/rotten
was applied, the issue is closedYou can:
/remove-lifecycle rotten
/close
Please send feedback to sig-contributor-experience at kubernetes/community.
/lifecycle rotten
Describe the bug After upgrading the ALBC to v2.7.2, only 2 of our 3 correctly-annotated subnets are registered to ALB, which causes some of the ip-targets to have status
Unused
with an error:Target is in an Availability Zone that is not enabled for the load balancer
Steps to reproduce Create an ingress without specifying annotation
alb.ingress.kubernetes.io/subnets
. A new ALB gets created, but only having 2 of the 3 subnets.Expected outcome The load balancer gets created with all 3 subnets that have the label
kubernetes.io/role/internal-elb=1
Environment Kubernetes: 1.29.1 ALBC: v2.7.2 EKS platform version: eks.6
Additional Context: I tried to find anything subnet-discovery related from ALBC debug logs, but found nothing.
As a workaround, I added the
alb.ingress.kubernetes.io/subnets
annotation with a list of all 3 subnets, which fixed the issue for now.Full list of annotations used: alb.ingress.kubernetes.io/backend-protocol: HTTP
alb.ingress.kubernetes.io/healthcheck-path: /ping
alb.ingress.kubernetes.io/ip-address-type: dualstack
alb.ingress.kubernetes.io/listen-ports: [{"HTTP": 80}]
alb.ingress.kubernetes.io/load-balancer-attributes: routing.http2.enabled=false alb.ingress.kubernetes.io/scheme: internal
alb.ingress.kubernetes.io/target-group-attributes: load_balancing.algorithm.type=round_robin
alb.ingress.kubernetes.io/target-type: ip
kubernetes.io/ingress.class: alb