-
Notifications
You must be signed in to change notification settings - Fork 323
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[EKS|kops] [NLB stability]: Fixes for kube-controller not available on EKS yet #62
Comments
I've seen users report on kops as well |
some chat about it https://kubernetes.slack.com/archives/C9MBGQJRH/p1544541920308200 |
I'm running into this issue as well and am looking for a way to fix it |
thread in kubernetes slack (linked above) has workaround for now - just fixing the security group |
For convenience:
|
@patrickleet thanks for referencing a fix! I'm seeing this issue due to cluster-autoscaling, so ideally I'd need an automated fix because the cluster scales many times per day. |
yea agree - anyone from AWS care to comment? |
guess not |
Some activity kubernetes/kubernetes#68422 Looks like Kube 1.14 will have fix and @M00nF1sh is cherry picking to 1.11 and 1.13 so it may be available sooner |
@tabern I know I wrote EKS, and it has just been labeled as so - but this affect kops as well. It's an NLB with Kubernetes issue more than EKS specific |
cherry-picked into 1.11 kubernetes/kubernetes#72981 |
Looks to be fixed in v1.11.6 Commit Hash So whenever that becomes available through EKS.. :) |
Assuming this will be a platform update in EKS 1.11, i.e. eks.2? |
any rough timeline on when next eks release might be? |
For those on kops, this is released and working according to other users - still no word on next EKS release |
It should be fixed now. #188 |
Fixed with #188 and 1.11.8 platform roll out. |
Tell us about your request
What do you want us to build?
I want network load balancers to work on EKS without breaking Security Groups when nodes change, and I want that to happen before 1.13 which includes the fix for kube-controller-manager because that's obviously a long way out given 1.11 was just made available.
Without this, EKS is not usable.
Which service(s) is this request for?
This could be Fargate, ECS, EKS, ECR
EKS
Tell us about the problem you're trying to solve. What are you trying to do, and why is it hard?
What outcome are you trying to achieve, ultimately, and why is it hard/impossible to do right now? What is the impact of not having this problem solved? The more details you can provide, the better we'll be able to understand and solve the problem.
I have to monitor my cluster for new nodes which break the security group and bring the whole cluster down.
Are you currently working around this issue?
How are you currently solving this problem?
Modifying the security group by finding an "unhealthy node" from the NLB targets, and modifying the security group on that node to re-allow traffic to the healthcheck port.
Additional context
Anything else we should know?
It's fixed in 1.13... apparently.
Attachments
If you think you might have additional information that you'd like to include via an attachment, please do - we'll take a look. (Remember to remove any personally-identifiable information.)
Yup here's some github issue links:
kubernetes/kubernetes#64148
kubernetes/kubernetes#68422
The text was updated successfully, but these errors were encountered: