-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
docs: add DNS configuration & verification steps to the docs #80
Comments
It looks like the alternative fix alone is not enough. I just had the issue where
The only fix was the removing a bad |
Final fix to the FATAL loop error /
|
K8s DNS resolution breaks in pods when one uses DHCP / has bad DNS search domain is configured.
/etc/resolv.conf
file (kubelet does this);SERVFAIL
error (host google.com
,dig google.com
,nslookup google.com
);/etc/resolv.conf
file;accept-ra
is enabled in the netplan by default => refs https://bugs.launchpad.net/netplan/+bug/1858503The working netplan config:
We should document this case and give users the verification steps so they can verify their DNS is working properly once they set up the K8s cluster.
Alternative fixProvider owner can also change
dnsPolicy
fromDefault
toClusterFirst
for thecoredns
deployment &nodelocaldns
daemonset which will fix this behavior even when bad DNS search domain is present in the/etc/resolv.conf
file:More about the
dnsPolicy
-> https://kubernetes.io/docs/concepts/services-networking/dns-pod-service/#pod-s-dns-policyAlso worth reading https://kubernetes.io/docs/tasks/administer-cluster/dns-custom-nameservers/
The text was updated successfully, but these errors were encountered: