Fix firewall to allow etcd client traffic between controllers
* Broaden internal-etcd firewall rule to allow etcd client traffic (2379) from other controller nodes * Previously, kube-apiservers were only able to connect to their node's local etcd peer. While master node outages were tolerated, reaching a healthy peer took longer than neccessary in some cases * Reduce time needed to bootstrap a cluster
This commit is contained in:
parent
b8eeafe4f9
commit
e58b424882
|
@ -14,6 +14,9 @@ Notable changes between versions.
|
||||||
|
|
||||||
#### Google Cloud
|
#### Google Cloud
|
||||||
|
|
||||||
|
* Fix firewall to allow etcd client port 2379 traffic between controller nodes ([#287](https://github.com/poseidon/typhoon/pull/287))
|
||||||
|
* kube-apiservers were only able to connect to their node's local etcd peer. While master node outages were tolerated, reaching a healthy peer took longer than neccessary in some cases
|
||||||
|
* Reduce time needed to bootstrap the cluster
|
||||||
* Remove firewall rule allowing workers to access Nginx Ingress health check ([#284](https://github.com/poseidon/typhoon/pull/284))
|
* Remove firewall rule allowing workers to access Nginx Ingress health check ([#284](https://github.com/poseidon/typhoon/pull/284))
|
||||||
* Nginx Ingress addon no longer uses hostNetwork, Prometheus scrapes via CNI network
|
* Nginx Ingress addon no longer uses hostNetwork, Prometheus scrapes via CNI network
|
||||||
|
|
||||||
|
|
|
@ -9,7 +9,7 @@ Provisioning times vary based on the operating system and platform. Sampling the
|
||||||
| AWS | 6 min | 5 min |
|
| AWS | 6 min | 5 min |
|
||||||
| Bare-Metal | 10-15 min | NA |
|
| Bare-Metal | 10-15 min | NA |
|
||||||
| Digital Ocean | 3 min 30 sec | 20 sec |
|
| Digital Ocean | 3 min 30 sec | 20 sec |
|
||||||
| Google Cloud | 10 min | 4 min 30 sec |
|
| Google Cloud | 6 min | 4 min 30 sec |
|
||||||
|
|
||||||
Notes:
|
Notes:
|
||||||
|
|
||||||
|
|
|
@ -23,7 +23,7 @@ resource "google_compute_firewall" "internal-etcd" {
|
||||||
|
|
||||||
allow {
|
allow {
|
||||||
protocol = "tcp"
|
protocol = "tcp"
|
||||||
ports = [2380]
|
ports = [2379, 2380]
|
||||||
}
|
}
|
||||||
|
|
||||||
source_tags = ["${var.cluster_name}-controller"]
|
source_tags = ["${var.cluster_name}-controller"]
|
||||||
|
|
|
@ -23,7 +23,7 @@ resource "google_compute_firewall" "internal-etcd" {
|
||||||
|
|
||||||
allow {
|
allow {
|
||||||
protocol = "tcp"
|
protocol = "tcp"
|
||||||
ports = [2380]
|
ports = [2379, 2380]
|
||||||
}
|
}
|
||||||
|
|
||||||
source_tags = ["${var.cluster_name}-controller"]
|
source_tags = ["${var.cluster_name}-controller"]
|
||||||
|
|
Loading…
Reference in New Issue