Skip to content

Commit d1a1e8b

Browse files
authored
Add metadata and improve formatting in documentation
1 parent 8d8afe3 commit d1a1e8b

1 file changed

Lines changed: 44 additions & 18 deletions

File tree

support/azure/azure-kubernetes/connectivity/tunnel-connectivity-issues.md

Lines changed: 44 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,13 @@
1+
---
2+
title: Tunnel connectivity issues
3+
description: Resolve communication issues that are related to tunnel connectivity in an Azure Kubernetes Service (AKS) cluster.
4+
ms.date: 09/26/2024
5+
ms.reviewer: chiragpa, andbar, v-leedennis, v-weizhu
6+
ms.service: azure-kubernetes-service
7+
keywords: Azure Kubernetes Service, AKS cluster, Kubernetes cluster, tunnels, connectivity, tunnel-front, aks-link
8+
#Customer intent: As an Azure Kubernetes user, I want to avoid tunnel connectivity issues so that I can use an Azure Kubernetes Service (AKS) cluster successfully.
9+
ms.custom: sap:Connectivity
10+
---
111
# Tunnel connectivity issues
212

313
Microsoft Azure Kubernetes Service (AKS) uses a specific component for tunneled, secure communication between the nodes and the control plane. The tunnel consists of a server on the control plane side and a client on the cluster nodes side. This article discusses how to troubleshoot and resolve issues that relate to tunnel connectivity in AKS.
@@ -26,8 +36,11 @@ The Kubernetes API server uses port 10250 to connect to a node's kubelet to retr
2636
Because the tunnel components or the connectivity between the server and client can't be established, functionality such as the following won't work as expected:
2737

2838
- Admission controller webhooks
39+
2940
- Ability of log retrieval (using the [kubectl logs](https://kubernetes.io/docs/reference/generated/kubectl/kubectl-commands#logs) command)
41+
3042
- Running a command in a container or getting inside a container (using the [kubectl exec](https://kubernetes.io/docs/reference/generated/kubectl/kubectl-commands#exec) command)
43+
3144
- Forwarding one or more local ports of a pod (using the [kubectl port-forward](https://kubernetes.io/docs/reference/generated/kubectl/kubectl-commands#port-forward) command)
3245

3346
## Cause 1: A network security group (NSG) is blocking port 10250
@@ -58,8 +71,8 @@ If you use an NSG, and you have specific restrictions, make sure that you add a
5871
If you want to be more restrictive, you can allow access to port 10250 at the subnet level only.
5972

6073
> [!NOTE]
61-
>
6274
> - The **Priority** field must be adjusted accordingly. For example, if you have a rule that denies multiple ports (including port 10250), the rule that's shown in the image should have a lower priority number (lower numbers have higher priority). For more information about **Priority**, see [Security rules](/azure/virtual-network/network-security-groups-overview#security-rules).
75+
>
6376
> - If you don't see any behavioral change after you apply this solution, you can re-create the tunnel component pods. Deleting these pods causes them to be re-created.
6477
6578
## Cause 2: The Uncomplicated Firewall (UFW) tool is blocking port 10250
@@ -188,14 +201,22 @@ You can view the SNAT ports from either the AKS load balancer metrics or the ser
188201
To use AKS load balancer metrics to view the SNAT ports, follow these steps:
189202

190203
1. In the [Azure portal](https://portal.azure.com), search for and select **Kubernetes services**.
191-
2. In the list of Kubernetes services, select the name of your cluster.
192-
3. In the menu pane of the cluster, find the **Settings** heading, and then select **Properties**.
193-
4. Select the name that's listed under **Infrastructure resource group**.
194-
5. Select the **kubernetes** load balancer.
195-
6. In the menu pane of the load balancer, find the **Monitoring** heading, and then select **Metrics**.
196-
7. For the metric type, select **SNAT Connection Count**.
197-
8. Select **Apply splitting**.
198-
9. Set **Split by** to **Connection State**.
204+
205+
1. In the list of Kubernetes services, select the name of your cluster.
206+
207+
1. In the menu pane of the cluster, find the **Settings** heading, and then select **Properties**.
208+
209+
1. Select the name that's listed under **Infrastructure resource group**.
210+
211+
1. Select the **kubernetes** load balancer.
212+
213+
1. In the menu pane of the load balancer, find the **Monitoring** heading, and then select **Metrics**.
214+
215+
1. For the metric type, select **SNAT Connection Count**.
216+
217+
1. Select **Apply splitting**.
218+
219+
1. Set **Split by** to **Connection State**.
199220

200221
</details>
201222

@@ -205,11 +226,16 @@ To use AKS load balancer metrics to view the SNAT ports, follow these steps:
205226
To use service diagnostics to view the SNAT ports, follow these steps:
206227

207228
1. In the [Azure portal](https://portal.azure.com), search for and select **Kubernetes services**.
208-
2. In the list of Kubernetes services, select the name of your cluster.
209-
3. In the menu pane of the cluster, select **Diagnose and solve problems**.
210-
4. Select **Connectivity Issues**.
211-
5. Under **SNAT Connection and Port Allocation**, select **View details**.
212-
6. If necessary, use the **Time Range** button to customize the time frame.
229+
230+
1. In the list of Kubernetes services, select the name of your cluster.
231+
232+
1. In the menu pane of the cluster, select **Diagnose and solve problems**.
233+
234+
1. Select **Connectivity Issues**.
235+
236+
1. Under **SNAT Connection and Port Allocation**, select **View details**.
237+
238+
1. If necessary, use the **Time Range** button to customize the time frame.
213239

214240
</details>
215241

@@ -225,10 +251,6 @@ If everything is OK within the application, you'll have to adjust the allocated
225251

226252
You can set up a new cluster to use a Managed Network Address Translation (NAT) Gateway for outbound connections. For more information, see [Create an AKS cluster with a Managed NAT Gateway](/azure/aks/nat-gateway#create-an-aks-cluster-with-a-managed-nat-gateway).
227253

228-
[!INCLUDE [Third-party contact disclaimer](../../../includes/third-party-contact-disclaimer.md)]
229-
230-
[!INCLUDE [Azure Help Support](../../../includes/azure-help-support.md)]
231-
232254
## Cause 6: Konnectivity Agents performance challenges with Cluster Growth
233255

234256
> [!NOTE]
@@ -237,3 +259,7 @@ You can set up a new cluster to use a Managed Network Address Translation (NAT)
237259
### Solution 6: Cluster Proportional Autoscaler (CPA) for Konnectivity Agent
238260

239261
To address scalability challenges in large clusters, we have implemented the Cluster Proportional Autoscaler (CPA) for our Konnectivity Agents. This approach aligns with industry standards and best practices, ensuring optimal resource usage and enhanced performance. Previously, the Konnectivity agent had a fixed replica count, which created a bottleneck as the cluster grew. With this change, the replica count will now dynamically adjust based on node-scaling rules, providing best-in-class performance.
262+
263+
[!INCLUDE [Third-party contact disclaimer](../../../includes/third-party-contact-disclaimer.md)]
264+
265+
[!INCLUDE [Azure Help Support](../../../includes/azure-help-support.md)]

0 commit comments

Comments
 (0)