Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Use node-ip and node-external-ip flags for proper intra node traffic #87

Merged
merged 1 commit into from
Sep 24, 2024

Conversation

e-minguez
Copy link
Contributor

@e-minguez e-minguez commented Sep 23, 2024

Closes #80

❯ (
MODULENAME="demo_cluster"
IFS=$'\n'
for cluster in $(terraform output -json | jq -r ".${MODULENAME}.value.k3s_api | keys[]"); do
  IP=$(terraform output -json | jq -r ".${MODULENAME}.value.k3s_api[\"${cluster}\"]")
  ssh -q -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no root@${IP} kubectl get nodes -o wide
done
)
NAME                        STATUS   ROLES                       AGE     VERSION        INTERNAL-IP    EXTERNAL-IP     OS-IMAGE                         KERNEL-VERSION    CONTAINER-RUNTIME
sv-production-k3s-cp-0      Ready    control-plane,etcd,master   2m39s   v1.30.4+k3s1   10.67.34.141   139.178.70.53   Debian GNU/Linux 11 (bullseye)   5.10.0-32-amd64   containerd://1.7.20-k3s1
sv-production-k3s-cp-1      Ready    control-plane,etcd,master   14s     v1.30.4+k3s1   10.67.34.137   147.75.90.243   Debian GNU/Linux 11 (bullseye)   5.10.0-32-amd64   containerd://1.7.20-k3s1
sv-production-k3s-cp-2      Ready    control-plane,etcd,master   30s     v1.30.4+k3s1   10.67.34.135   147.75.90.215   Debian GNU/Linux 11 (bullseye)   5.10.0-32-amd64   containerd://1.7.20-k3s1
sv-production-k3s-node-00   Ready    <none>                      45s     v1.30.4+k3s1   10.67.34.133   147.75.90.147   Debian GNU/Linux 11 (bullseye)   5.10.0-32-amd64   containerd://1.7.20-k3s1
sv-production-k3s-node-01   Ready    <none>                      50s     v1.30.4+k3s1   10.67.34.129   147.28.180.81   Debian GNU/Linux 11 (bullseye)   5.10.0-32-amd64   containerd://1.7.20-k3s1
sv-production-k3s-node-02   Ready    <none>                      55s     v1.30.4+k3s1   10.67.34.131   147.75.90.143   Debian GNU/Linux 11 (bullseye)   5.10.0-32-amd64   containerd://1.7.20-k3s1

@displague
Copy link
Member

Looks good to me:

root@k3s-demo-cluster-k3s-cp-aio:~# kubectl get nodes  -A -o wide 
NAME                          STATUS   ROLES                  AGE     VERSION        INTERNAL-IP   EXTERNAL-IP      OS-IMAGE                         KERNEL-VERSION    CONTAINER-RUNTIME
k3s-demo-cluster-k3s-cp-aio   Ready    control-plane,master   8m49s   v1.30.5+k3s1   10.25.17.1    <redacted>   Debian GNU/Linux 11 (bullseye)   5.10.0-32-amd64   containerd://1.7.21-k3s2

@displague displague merged commit ff152f7 into equinix-labs:main Sep 24, 2024
1 check passed
@e-minguez e-minguez deleted the private-ips branch September 24, 2024 21:05
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Use Private IPs and backend transfer for internal node addresses
2 participants