-
Notifications
You must be signed in to change notification settings - Fork 610
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[occm] The pods cannot access each other when across nodes #2482
Comments
I think CPO expects CAPO or other deployment tool to manage this. Why can't it be done there? |
As I mentioned here, This is route controller's duty to ensure the containers on different nodes in one Kubernetes cluster can communicate with each other. |
Yep, I'm sure. I've already done test, add extra node's security group can deal with this issue.
They are different issues. For ingress network traffic, the |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close not-planned |
@k8s-triage-robot: Closing this issue, marking it as "Not Planned". In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
Is this a BUG REPORT or FEATURE REQUEST?:
/kind bug
What happened:
I useed CAPO deployed a two nodes cluser. And start OCCM with below configurations:
And the CNI configurations like below:
But, the pods of node1 cannot access the pods of node 2 and vice versa.
What you expected to happen:
All of the pods can access each other.
How to reproduce it:
Deploy a multiple nodes cluser and config OCCM and CNI plugin as above.
Anything else we need to know?:
IMO, This due to the node's security group has no ingress rule to permit the network packet of other node's pods through directly
Environment:
The text was updated successfully, but these errors were encountered: