Go to file
Dustin 473e279a18 tf/userdata: Remove default DNS configuration
Lately, cloud nodes seem to be failing to come up more frequently.  I
traced this down to the fact that `/etc/resolv.conf` in the `kube-proxy`
container contains both the AWS-provided DNS server and the on-premises
server set by Wireguard.  This evidently "works" correctly sometimes,
but not always.  When it doesn't, the `kube-proxy` cannot resolve the
Kubernetes API server address, and thus cannot create the necessary
netfilter rules to forward traffic correctly.  This causes pods to be
unable to communicate.

I am not entirely sure what the "correct" solution to this problem would
be, since there are various issues in play here.  Fortunately, cloud
nodes are only ever around for a short time, and never need to be
rebooted.  As such, we can use a "quick fix" and simply remove the
AWS-provided DNS configuration.
2023-11-13 19:52:57 -06:00
ci tests: Begin integration tests 2022-10-07 07:37:20 -05:00
examples examples: Add Kubernetes manifest 2022-10-11 21:52:05 -05:00
src events: Delete Node on instance termination 2022-10-11 20:00:24 -05:00
terraform tf/userdata: Remove default DNS configuration 2023-11-13 19:52:57 -06:00
tests test: Adjust k8s roles for integration tests 2022-10-11 21:08:49 -05:00
.dockerignore ci: Begin Jenkins build pipeline 2022-09-10 10:30:54 -05:00
.editorconfig terraform: Add config for auto-scaling group 2022-10-11 21:40:42 -05:00
.gitattributes Initial commit 2022-08-31 21:02:17 -05:00
.gitignore sns: Save messages to disk 2022-09-05 09:45:44 -05:00
Cargo.lock routes: Add kubeadm kubeconfig resource 2022-10-07 06:52:06 -05:00
Cargo.toml routes: Add kubeadm kubeconfig resource 2022-10-07 06:52:06 -05:00
Containerfile container: Rebase on Fedora 35 2022-09-11 13:17:54 -05:00
rustfmt.toml Initial commit 2022-08-31 21:02:17 -05:00