You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In PR #130, we have manually tested K8S nodeport feature using following steps. We should write a e2e testcase which can automatically execute these steps. Here are the detail steps:
create a cluster with 3 nodes (e.g. t2.medium)
kubectl create -f hello.yaml
apiVersion: apps/v1
kind: Deployment
metadata:
name: hello
spec:
selector:
matchLabels:
app: hello
tier: backend
track: stable
replicas: 15 <-- so that IP of primary ENI are used by these Pods
template:
metadata:
labels:
app: hello
tier: backend
track: stable
spec:
containers:
- name: hello
image: "gcr.io/google-samples/hello-go-gke:1.0"
ports:
- name: http
containerPort: 80
# find out node which runs frontend pod
kubectl get pod -o wide| grep frontend
# ssh into node where frontend pod runs
# ip rule show to verify frontend pod are using secondary ENIs
verify node port
# find out port for frontend service
kubectl get svc frontend
# log into one of hello pod
kubectl exec -ti <hello-pod-xxx> sh
# for each node in the cluster
wget http://<node-ip>:<frontend-port> should return index.html that contains {"message":"Hello"}
enable calico policy engine add-on
kubectl apply -f config/v1.1/calico.yaml
apply Network Policy allow connections from other hosts in the VPC (including K8S nodes) to access node port kubectl apply -f allow-policy.yaml
Comments on closed issues are hard for our team to see.
If you need more assistance, please open a new issue that references this one.
If you wish to keep having a conversation with other community members under this issue feel free to do so.
In PR #130, we have manually tested K8S nodeport feature using following steps. We should write a e2e testcase which can automatically execute these steps. Here are the detail steps:
kubectl create -f hello.yaml
kubectl apply -f hello-service.yaml
kubectl apply -f frontend.yaml
NOT
using primary enikubectl apply -f allow-policy.yaml
repeat node port tests step earlier. It should succeed
delete allow-policy.yaml
kubectl delete -f allow-policy.yaml
apply Network Policy which disallow other hosts in VPC to access node port
kubectl apply -f deny-policy.yaml
The text was updated successfully, but these errors were encountered: