-
Notifications
You must be signed in to change notification settings - Fork 1.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Set up firewall rules for cluster in GCP deployer #132
Comments
Taking a look at fixing this one. |
I have reproduced this issue, there is active work going on in this area by @mkjelland |
Issue assigned to @mkjelland |
This is not fixed yet. The firewall rule added in #352 enables communication between cluster nodes, but does not allow connections from pods running on a cluster to ports exposed from other nodes. |
/reopen |
@spew: you can't re-open an issue/PR unless you authored it or you are assigned to it. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
@mkjelland can you take a look at this one? |
/reopen |
@kawych - is this relevant to the google provider in clusterctl? The gcp deployer code is going away prior to the alpha release of the cluster api. |
Manually moved to kubernetes-sigs/cluster-api-provider-gcp#70. |
In clusters created with GCP deployer, pods can't connect to ports exposed by Kubelet on other nodes. For my cluster "test1" I worked it around adding a firewall rule:
192.168.1.0/24, 192.168.0.0/24 are IP ranges of pods in my cluster.
cc @karan @krousey
The text was updated successfully, but these errors were encountered: