Fix firewall to allow etcd client traffic between controllers

* Broaden internal-etcd firewall rule to allow etcd client
traffic (2379) from other controller nodes
* Previously, kube-apiservers were only able to connect to their
node's local etcd peer. While master node outages were tolerated,
reaching a healthy peer took longer than neccessary in some cases
* Reduce time needed to bootstrap a cluster
This commit is contained in:
Dalton Hubble 2018-08-21 23:21:05 -07:00
parent b8eeafe4f9
commit e58b424882
4 changed files with 6 additions and 3 deletions

View File

@ -14,6 +14,9 @@ Notable changes between versions.
#### Google Cloud
* Fix firewall to allow etcd client port 2379 traffic between controller nodes ([#287](https://github.com/poseidon/typhoon/pull/287))
* kube-apiservers were only able to connect to their node's local etcd peer. While master node outages were tolerated, reaching a healthy peer took longer than neccessary in some cases
* Reduce time needed to bootstrap the cluster
* Remove firewall rule allowing workers to access Nginx Ingress health check ([#284](https://github.com/poseidon/typhoon/pull/284))
* Nginx Ingress addon no longer uses hostNetwork, Prometheus scrapes via CNI network

View File

@ -9,7 +9,7 @@ Provisioning times vary based on the operating system and platform. Sampling the
| AWS | 6 min | 5 min |
| Bare-Metal | 10-15 min | NA |
| Digital Ocean | 3 min 30 sec | 20 sec |
| Google Cloud | 10 min | 4 min 30 sec |
| Google Cloud | 6 min | 4 min 30 sec |
Notes:

View File

@ -23,7 +23,7 @@ resource "google_compute_firewall" "internal-etcd" {
allow {
protocol = "tcp"
ports = [2380]
ports = [2379, 2380]
}
source_tags = ["${var.cluster_name}-controller"]

View File

@ -23,7 +23,7 @@ resource "google_compute_firewall" "internal-etcd" {
allow {
protocol = "tcp"
ports = [2380]
ports = [2379, 2380]
}
source_tags = ["${var.cluster_name}-controller"]