Skip to content

Conversation

@simonfelding
Copy link

The Cilium local redirect policy is broken. The solution posted here cilium/cilium#13040 (comment) solves the problem. This PR implements the solution.


Before:

⌛ [default] Waiting for pod cilium-test-1/client-b65598b6f-4fj5q to reach default/kubernetes service...
🐛 [default] Error looking up kubernetes.default from pod cilium-test-1/client-b65598b6f-4fj5q: error with exec request (pod=cilium-test-1/client-b65598b6f-4fj5q, container=): command terminated with exit code 1: "": ;; communications error to 240.0.0.10#53: timed out
;; communications error to 240.0.0.10#53: timed out
;; communications error to 240.0.0.10#53: timed out
;; no servers could be reached



🐛 [default] Error looking up kubernetes.default from pod cilium-test-1/client-b65598b6f-4fj5q: error with exec request (pod=cilium-test-1/client-b65598b6f-4fj5q, container=): context deadline exceeded: "": ;; communications error to 240.0.0.10#53: timed out

timeout reached waiting for lookup for kubernetes.default from pod cilium-test-1/client-b65598b6f-4fj5q to succeed (last error: error with exec request (pod=cilium-test-1/client-b65598b6f-4fj5q, container=): context deadline exceeded: "")

After:

✅ [cilium-test-1] All 61 tests (658 actions) successful, 44 tests skipped, 0 scenarios skipped.

@simonfelding simonfelding requested a review from a team as a code owner November 28, 2024 03:02
Copy link
Member

@brandond brandond left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for the contribution!

You need to bump the package version in chart.yaml if you're going to add new local changes

@simonfelding
Copy link
Author

Thanks for the contribution!

You need to bump the package version in chart.yaml if you're going to add new local changes

Appreciate the fast response! The cilium chart version tracks the upstream version, so I set a pre-release version on the chart. This can safely be removed when the next cilium version is released.

@brandond
Copy link
Member

No, sorry, wrong file - leave that alone. I mean this: https://github.com/rancher/rke2-charts/blob/main-source/packages/rke2-coredns/package.yaml#L2

@thomasferrandiz
Copy link
Contributor

@simonfelding thanks for the contribution.

Could you provide more details on how you deploy cilium and coredns?

I just ran

cilium connectivity test

with our current cilium chart and all the tests were passing including the one that is failing for you.

Did you follow all the steps in https://docs.rke2.io/networking/networking_services#nodelocal-dns-cache-with-cilium-in-kube-proxy-replacement-mode ?

@simonfelding
Copy link
Author

simonfelding commented Nov 28, 2024 via email

@thomasferrandiz
Copy link
Contributor

yes I have a similar setup (rke2 1.31 and no kube-proxy) but with SLES 15.6 instead of RHEL.

@simonfelding
Copy link
Author

I just updated rke2 which caused Cilium to update as well. This caused the problem once again, and the solution was exactly the same.

@thomasferrandiz Can you specify what you want to see from my setup?

@simonfelding
Copy link
Author

@thomasferrandiz I think I have an idea. It might be because I'm running RKE2 with Cilium and the CIS profile. Could it be that this is the cause of the issue? Two overlapping network policies regarding DNS?

https://docs.rke2.io/security/pod_security_standards
image

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants