Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Calico breaks DNS resolver on EKS #7800

Closed
abarrafo opened this issue Jun 17, 2023 · 1 comment
Closed

Calico breaks DNS resolver on EKS #7800

abarrafo opened this issue Jun 17, 2023 · 1 comment

Comments

@abarrafo
Copy link

Migrating from Amazon AWS VPC CNI to Calico.

I remove the vpc cni Addon, then following the tutorial here: https://docs.tigera.io/calico/3.25/getting-started/kubernetes/managed-public-cloud/eks

I am running on EKS on a multi az, 2 subnets deployment.

I set hostNetwork: true on a aws-load-balancer-controlller.

finally, I set the max pods on my node group, and change the node group name to roll over all the nodes to a new group.

Expected Behavior

Pod-to-pod networking to work across all nodes within a namespace

Current Behavior

Pod to Pod networking appears to only work on pods running on the same nodes.

I have an airflow service running (installed with helm), this creates the following pods:

pgbouncer, webserver, triggerer, statsd, redis, scheduler

Anytime these pods spin up on the same node, things work. But, when I see them spin up on different nodes (multi az). DNS resolution breaks. Namely, for example, when the webserver spins up in a different node than the pgbouncer, it hangs on connecting to airflow-pgbouncer.airflo (172.20.227.96) port 6543 failed.

That ip address looks incorrect to me, as the ip pool is:
default-ipv4-ippool 192.168.0.0/16 nat=true ipipmode=never vxlanmode=crossSubnet disabled=false disableBgpExport=false selector=all()

Would I expect that to resolve to a 192.168.0.0/16 ip on lookup? Is there additional calico config to enable this that I am missing?

Context

Working to migrate away from AWS VPC CNI to Calico

Your Environment

  • Calico version 3.25.1
  • EKS, with kubernetes 1.23, with KubeProxy and CoreDNS addons.
@abarrafo
Copy link
Author

I believe I have this worked out. I needed to remove the coredns, kubeproxy addons, deploy. Then add them back and re-deploy. Then, when monitoring the endpoints, it indeed switches over kube-dns to the calico network.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant