-
Notifications
You must be signed in to change notification settings - Fork 7.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Multi-Network VM Installation 503 no healthy upstream #33268
Comments
@nmnellis looks like from the VM service, the hello service's endpoint isn't correct (should be the east-west ingress gw's LB ip) as the VM service have to access the hello service from the east-west ingress gw. One reason this could happen is when we are not detecting networks properly for VM service or hello service or the east-west ingress gw. @howardjohn I saw we have troubleshooting instructions for MC multi-networks (https://istio.io/latest/docs/ops/diagnostic-tools/multicluster/#step-by-step-diagnosis) to check client + server network configurations, do we have similar docs for service on VM? @nmnellis said he tried the same steps on GKE and it works fine. |
Given #32962, it is likely mesh network config won't work for you on 1.10.0. Is your GKE env using same Istio 1.10.0 as EKS env? |
I've validated the hello pod and east-west gw are marked correctly for network, along w/ the service for VM. One thing is in EKS the east-west gw has a host name, e.g. x.us-east-2.elb.amazonaws.com for the EXTERNAL-IP value. @stevenctl @howardjohn - do we have any limitation with gw with host name in MC multi network env where istio can't replace the target service pod IP with its east-west gateway EXTERNAL-IP when EXTERNAL-IP is a hostname? |
Yes, see #29359. I think this problem is a little worse for VMs, since they need this resolvable just to reach the control plane, and the current design only handles the DNS in control plane. Maybe we can do something in agent where we resolve this and use the resolved IPs + the original discovery address so SNI will work? |
Thank you @stevenctl. Yea, I assume we need to resolve the east-west address of the gw on the VM so the vm can talk to istiod via the east-west gw and istio-agent seems a good home for this. I assume we will also need to resolve the east-west address in istiod so that istiod can determine what services' endpoints to push to the istio-proxy running on the VM. |
One workaround would be to set
What config we send is more related to #29359. I think this issue (#33268) should focus on the VM bootstrap/istiod reachability. |
Bug description
Following the tutorial here https://istio.io/latest/docs/setup/install/virtual-machine/ for multi-network automatic service entry creation causes the VM to get 503 unhealthy upstream because there are no cluster IP addresses defined for helloworld.sample.svc
[X] Docs
[ ] Installation
[X] Networking
[ ] Performance and Scalability
[ ] Extensions and Telemetry
[ ] Security
[ ] Test and Release
[ ] User Experience
[ ] Developer Infrastructure
[ ] Upgrade
Expected behavior
the VM installation demo would work as expected
Steps to reproduce the bug
Follow https://istio.io/latest/docs/setup/install/virtual-machine/ for multi-network automatic service entry creation on an eks cluster and VM over the open internet with open ports
Version (include the output of
istioctl version --remote
andkubectl version --short
andhelm version --short
if you used Helm)How was Istio installed?
istioctl
Environment where the bug was observed (cloud vendor, OS, etc)
EKS.5 1.19
Additionally, please consider running
istioctl bug-report
and attach the generated cluster-state tarball to this issueRefer cluster state archive for more details.
bug-report.tar.gz
The text was updated successfully, but these errors were encountered: