Closed bribroder closed 2 years ago
I eventually tracked this down to the NetworkPolicy; I think the only solution for a LoadBalancer is to add a rule permitting traffic by IP range:
networkPolicy:
ingress:
- from:
- ipBlock:
cidr: "0.0.0.0/0"
except: ["10.0.0.0/8"]
Hi there, I've successfully deployed the SSH service with a ClusterIP and connected to it with port-forwarding into the cluster and it works wonderfully--thanks for creating this utility!
I'd like to directly expose the SSH service with a LoadBalancer on AWS but I can't figure out how to get the load balancer to consider the instances "healthy". Right now, they never enter the InService state--so I can establish a connection, but it immediately disconnects. It seems like the load balancer's health check is unable to establish a TCP connection to the SSH service, maybe because of mismatched ports somewhere?
Configuration:
My service shows up with what seems like matching port numbers:
The actual LoadBalancer has the same ports and protocols too:
But the instances all report "OutOfService" / "Unhealthy" and when I try to SSH in via this load balancer I am immediately disconnected:
I've also tried launching a Network Load Balancer by installing with some service annotations:
Which creates an otherwise identical service to the above but with an NLB--sadly, I just get a timeout without any success.
Note: my jupyterhub is deployed using the official helm chart but is configured to use a ClusterIP + Ingress and is not exposed to the internet--so I don't use the autohttps/letsencrypt functionality of the hub proxy:
Is there something I can add to the jupyterhub-ssh configuration which will get it working with a LoadBalancer?
Thank you!