You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
#Customer intent: As an Azure Kubernetes user, I want to avoid tunnel connectivity issues so that I can use an Azure Kubernetes Service (AKS) cluster successfully.
9
+
ms.custom: sap:Connectivity
10
+
---
1
11
# Tunnel connectivity issues
2
12
3
13
Microsoft Azure Kubernetes Service (AKS) uses a specific component for tunneled, secure communication between the nodes and the control plane. The tunnel consists of a server on the control plane side and a client on the cluster nodes side. This article discusses how to troubleshoot and resolve issues that relate to tunnel connectivity in AKS.
@@ -26,8 +36,11 @@ The Kubernetes API server uses port 10250 to connect to a node's kubelet to retr
26
36
Because the tunnel components or the connectivity between the server and client can't be established, functionality such as the following won't work as expected:
27
37
28
38
- Admission controller webhooks
39
+
29
40
- Ability of log retrieval (using the [kubectl logs](https://kubernetes.io/docs/reference/generated/kubectl/kubectl-commands#logs) command)
41
+
30
42
- Running a command in a container or getting inside a container (using the [kubectl exec](https://kubernetes.io/docs/reference/generated/kubectl/kubectl-commands#exec) command)
43
+
31
44
- Forwarding one or more local ports of a pod (using the [kubectl port-forward](https://kubernetes.io/docs/reference/generated/kubectl/kubectl-commands#port-forward) command)
32
45
33
46
## Cause 1: A network security group (NSG) is blocking port 10250
@@ -58,8 +71,8 @@ If you use an NSG, and you have specific restrictions, make sure that you add a
58
71
If you want to be more restrictive, you can allow access to port 10250 at the subnet level only.
59
72
60
73
> [!NOTE]
61
-
>
62
74
> - The **Priority** field must be adjusted accordingly. For example, if you have a rule that denies multiple ports (including port 10250), the rule that's shown in the image should have a lower priority number (lower numbers have higher priority). For more information about **Priority**, see [Security rules](/azure/virtual-network/network-security-groups-overview#security-rules).
75
+
>
63
76
> - If you don't see any behavioral change after you apply this solution, you can re-create the tunnel component pods. Deleting these pods causes them to be re-created.
64
77
65
78
## Cause 2: The Uncomplicated Firewall (UFW) tool is blocking port 10250
@@ -188,14 +201,22 @@ You can view the SNAT ports from either the AKS load balancer metrics or the ser
188
201
To use AKS load balancer metrics to view the SNAT ports, follow these steps:
189
202
190
203
1. In the [Azure portal](https://portal.azure.com), search for and select **Kubernetes services**.
191
-
2. In the list of Kubernetes services, select the name of your cluster.
192
-
3. In the menu pane of the cluster, find the **Settings** heading, and then select **Properties**.
193
-
4. Select the name that's listed under **Infrastructure resource group**.
194
-
5. Select the **kubernetes** load balancer.
195
-
6. In the menu pane of the load balancer, find the **Monitoring** heading, and then select **Metrics**.
196
-
7. For the metric type, select **SNAT Connection Count**.
197
-
8. Select **Apply splitting**.
198
-
9. Set **Split by** to **Connection State**.
204
+
205
+
1. In the list of Kubernetes services, select the name of your cluster.
206
+
207
+
1. In the menu pane of the cluster, find the **Settings** heading, and then select **Properties**.
208
+
209
+
1. Select the name that's listed under **Infrastructure resource group**.
210
+
211
+
1. Select the **kubernetes** load balancer.
212
+
213
+
1. In the menu pane of the load balancer, find the **Monitoring** heading, and then select **Metrics**.
214
+
215
+
1. For the metric type, select **SNAT Connection Count**.
216
+
217
+
1. Select **Apply splitting**.
218
+
219
+
1. Set **Split by** to **Connection State**.
199
220
200
221
</details>
201
222
@@ -205,11 +226,16 @@ To use AKS load balancer metrics to view the SNAT ports, follow these steps:
205
226
To use service diagnostics to view the SNAT ports, follow these steps:
206
227
207
228
1. In the [Azure portal](https://portal.azure.com), search for and select **Kubernetes services**.
208
-
2. In the list of Kubernetes services, select the name of your cluster.
209
-
3. In the menu pane of the cluster, select **Diagnose and solve problems**.
210
-
4. Select **Connectivity Issues**.
211
-
5. Under **SNAT Connection and Port Allocation**, select **View details**.
212
-
6. If necessary, use the **Time Range** button to customize the time frame.
229
+
230
+
1. In the list of Kubernetes services, select the name of your cluster.
231
+
232
+
1. In the menu pane of the cluster, select **Diagnose and solve problems**.
233
+
234
+
1. Select **Connectivity Issues**.
235
+
236
+
1. Under **SNAT Connection and Port Allocation**, select **View details**.
237
+
238
+
1. If necessary, use the **Time Range** button to customize the time frame.
213
239
214
240
</details>
215
241
@@ -225,10 +251,6 @@ If everything is OK within the application, you'll have to adjust the allocated
225
251
226
252
You can set up a new cluster to use a Managed Network Address Translation (NAT) Gateway for outbound connections. For more information, see [Create an AKS cluster with a Managed NAT Gateway](/azure/aks/nat-gateway#create-an-aks-cluster-with-a-managed-nat-gateway).
[!INCLUDE [Azure Help Support](../../../includes/azure-help-support.md)]
231
-
232
254
## Cause 6: Konnectivity Agents performance challenges with Cluster Growth
233
255
234
256
> [!NOTE]
@@ -237,3 +259,7 @@ You can set up a new cluster to use a Managed Network Address Translation (NAT)
237
259
### Solution 6: Cluster Proportional Autoscaler (CPA) for Konnectivity Agent
238
260
239
261
To address scalability challenges in large clusters, we have implemented the Cluster Proportional Autoscaler (CPA) for our Konnectivity Agents. This approach aligns with industry standards and best practices, ensuring optimal resource usage and enhanced performance. Previously, the Konnectivity agent had a fixed replica count, which created a bottleneck as the cluster grew. With this change, the replica count will now dynamically adjust based on node-scaling rules, providing best-in-class performance.
0 commit comments