Closed zadjadr closed 1 year ago
UDP 4244 should not be needed https://docs.cilium.io/en/latest/operations/system_requirements/#firewall-requirements
following firewall changes at least needed:
firewall changes https://github.com/kubernetes/kops/pull/15635
I cannot say anything to that certificate as I am not using cillium. ping @olemarkus ideas why it uses different format in that? I am still on vacation so I do not have access to openstack environment, need to wait until next month to solve that cert issue.
Thanks @zetaab
/kind bug
1. What
kops
version are you running? The commandkops version
, will display this information.Client version: 1.26.4 (git-v1.26.4)
2. What Kubernetes version are you running?
kubectl version
will print the version if a cluster is running or provide the Kubernetes version specified as akops
flag.3. What cloud provider are you using?
openstack
4. What commands did you run? What is the simplest way to reproduce this issue?
I added cilium as my CNI and enabled hubble, here are are settings that might be of interest:
5. What happened after the commands executed?
Before creating a new Certificate (see 9):
Before adding the security group (see 9):
6. What did you expect to happen?
I expected
hubble-relay
to be able to connect without any issues.The certificate should create the correct dns name.
The other missing puzzle piece was, that port
4244
(TCP/UDP) needs to be added to the security groups of all nodes, when hubble is activated. So for now, I've created an addicional security groupcilium.hubble.zcluster.k8s.local
.7. Please provide your cluster manifest.
Execute
kops get --name my.example.com -o yaml
to display your cluster manifest. You may want to remove your cluster name and other sensitive information.**8. Please run the commands with most verbose logging by adding the
-v 10
flag. Paste the logs into this report, or in a gist and provide the gist link here.9. Anything else do we need to know?
I fixed this by recreating the
Certificate
, adding the new dns name. And by creating a new security group which allows ingress to TCP of 4244 for all nodes within the network cidr.