-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
DNS not working after reboot #2383
Comments
I assume this snippet was a copy paste error, is missin the latest 2 digits for the ip address
are you using one node or mulitple nodes in the cluster? |
Hi also running into this issue! Although I'm not sure that this is caused by a restart for me necessarily.
Here is what I get when I inspect the kind network
output from ip addr
finally logs from a coredns pod
|
Hey, for us, the same issue happens after stopping/rebooting docker. Edit: we're running a single node setup, with the following config (copied from the website):
|
@AlmogBaku I still can't reproduce this in any of our environments. We need to know more about yours. |
That usually happens after a few times I'm closing the Docker. Both me and @RomansWorks are using macOS |
I have the same issue here in my dev environment... the weird thing is when I connect into the pod using bash and try But when I try it into my application it can not be solved and everything just doesn't work... and there is no error returned (that is weird too) Although, if I use the POD IP it works normally... My stack is:
NOTES:
|
@alexandresgf please don't use screenshot, those are hard to read. Is this problem happening after reboot or it never worked? |
Sorry for that!
At first it worked for a while, then sundenlly it happened after a reboot and the DNS never worked anymore even I removing the kind completely and doing a fresh install. |
I got a similar problem. I created a local kind cluster and it was working fine during the entire weekend, but today, when I rebooted my PC, the dns is completely down. I tried restart docker, and even manually the CoreDNS container, but doens´t fix the issue. I got errors like this all over my containers:
And it´s not only on the internal network. Even external requests are failing with the same error.
Any idea? |
I observe the same issues when using KinD in a WSL2/Windows 11 environment. Example logs from the CoreDNS pod:
|
this is an old version, also wsl2/windows11 environments had some known issue, are you using latest version? This bug is starting to become a placeholder, I wonder if we should close it an open more specific bugs, is not the same cluster not works after reboot in windows, that with podman, or with lima, ... |
Hi @aojea, which component are you saying is outdated? I'm using kind 0.17.0 and I created the cluster using the command I don't believe any of the WSL2 known issues are related to this? They all seem to be related to Docker Desktop behaviour. |
I had this issue, in a local cluster: kind v0.20.0 go1.20.4 Image: registry.k8s.io/coredns/coredns:v1.10.1 to fix it, I update forward directive in the coredns configmap resource: forward . 8.8.8.8 { |
Somewhat of a niche case, but here is what caused and solved the issue for me (which occured in a KinD Kubernetes cluster)...
Hopefully this helps someone else too! |
@maze88 the kind node does not uses that resolv.conf directly
that kind of problem is not possible to fix from kind |
Wait, that should not be happening, it should be using the embedded DNS resolver, are you using a custom KIND_EXPERIMENTAL_ETWORK_NAME or something like that? (~unsupported and likely to break things, really tempted to remove this) |
I'm using
With a brief test (by fiddling with my |
Hmm, v0.20 is a little old but I don't think we changed much related to this since. That coreDNS config looks right, but https://docs.docker.com/engine/network/#dns-services (we use a custom network) kind does some hackery to change the IP used for that resolver, but it should still be that one container-local resolver socket and not the host resolvers. however, those host resolvers will be used indirectly via the docker daemon, so rather than it being coreDNS, it may be dockerd on the host that fails to use the secondary resolver, which is not something kind can fix, but would explain what you observed. |
The embedded resolver docker provides is basically just a socket injected into containers attached to a network other than the default The intention in leveraging this in kind is:
|
What happened:
I created a new kind cluster, then rebooted my computer. After reboot, the dns cannot resolve adresses
What you expected to happen:
dns can resolve adresses
How to reproduce it (as minimally and precisely as possible):
Taken from https://kubernetes.io/docs/tasks/run-application/access-api-from-pod/#without-using-a-proxy
Anything else we need to know?:
dns lookup:
rslov.conf:
Environment:
kind version
): kind v0.11.1 go1.16.4 linux/amd64kubectl version
): Client Version: version.Info{Major:"1", Minor:"21", GitVersion:"v1.21.1", GitCommit:"5e58841cce77d4bc13713ad2b91fa0d961e69192", GitTreeState:"clean", BuildDate:"2021-05-12T14:18:45Z", GoVersion:"go1.16.4", Compiler:"gc", Platform:"linux/amd64"}Server Version: version.Info{Major:"1", Minor:"21", GitVersion:"v1.21.1", GitCommit:"5e58841cce77d4bc13713ad2b91fa0d961e69192", GitTreeState:"clean", BuildDate:"2021-05-21T23:01:33Z", GoVersion:"go1.16.4", Compiler:"gc", Platform:"linux/amd64"}
docker info
): Client:Context: default
Debug Mode: false
Server:
Containers: 5
Running: 2
Paused: 0
Stopped: 3
Images: 11
Server Version: 20.10.6-ce
Storage Driver: btrfs
Build Version: Btrfs v4.15
Library Version: 102
Logging Driver: json-file
Cgroup Driver: cgroupfs
Cgroup Version: 1
Plugins:
Volume: local
Network: bridge host ipvlan macvlan null overlay
Log: awslogs fluentd gcplogs gelf journald json-file local logentries splunk syslog
Swarm: inactive
Runtimes: oci runc io.containerd.runc.v2 io.containerd.runtime.v1.linux
Default Runtime: runc
Init Binary: docker-init
containerd version: 05f951a3781f4f2c1911b05e61c160e9c30eaa8e
runc version: 12644e614e25b05da6fd08a38ffa0cfe1903fdec
init version:
Security Options:
apparmor
seccomp
Profile: default
Kernel Version: 5.3.18-59.16-default
Operating System: openSUSE Leap 15.3
OSType: linux
Architecture: x86_64
CPUs: 8
Total Memory: 7.552GiB
Name: Proxima-Centauri
ID: M6J5:OLHQ:FXVM:M7WG:2OUA:SKGW:UCF5:DWJZ:4M7T:YA2W:6FBT:DOLG
Docker Root Dir: /var/lib/docker
Debug Mode: false
Registry: https://index.docker.io/v1/
Labels:
Experimental: false
Insecure Registries:
127.0.0.0/8
Live Restore Enabled: false
WARNING: No swap limit support
/etc/os-release
): NAME="openSUSE Leap"VERSION="15.3"
ID="opensuse-leap"
ID_LIKE="suse opensuse"
VERSION_ID="15.3"
PRETTY_NAME="openSUSE Leap 15.3"
ANSI_COLOR="0;32"
CPE_NAME="cpe:/o:opensuse:leap:15.3"
BUG_REPORT_URL="https://bugs.opensuse.org"
HOME_URL="https://www.opensuse.org/"
The text was updated successfully, but these errors were encountered: