How can I troubleshoot managed node group update issues for Amazon EKS?
I'm trying to update my Amazon Elastic Kubernetes Service (Amazon EKS) managed node group and am experiencing issues.
When you update your Amazon EKS managed node group, you might receive one of the following errors:
- "PodEvictionFailure Reached max retries while trying to evict pods from nodes in node group nodegroup-1234"
- "Error: Nodegroup health has issues other than AsgInstanceLaunchFailures, InstanceLimitExceeded, InsufficientFreeAddresses, ClusterUnreachable"
- "Error: InvalidParameterException: Launch template details can't be null for Custom ami type node group"
"An error occurred (InvalidParameterException) when calling the UpdateNodegroupVersion operation: You cannot specify the field kubernetesVersion when using custom AMIs"
- "UPDATE_FAILED Resource handler returned message: Requested release version 1.xx is not valid for kubernetes version 1.yy"
To resolve Amazon EKS managed node group update errors, follow these troubleshooting steps.
Note: If you receive errors when running AWS Command Line Interface (AWS CLI) commands, make sure that you’re using the most recent AWS CLI version.
PodEvictionFailure Reached max retries while trying to evict pods from nodes in node group nodegroup-1234
The PodEvictionFailure error occurs when the upgrade can't drain all the pods from the node. If a pod disruption budget (PDB) is preventing pods from being drained from the node, then this can cause the issue. For example, if an application has a PDB of two, then at least two pods for that application must be running.
To check if your application is using a PDB, run the following kubectl command:
$ kubectl get pdb —all-namespaces
If you're using a PDB, then take one of the following actions:
- Increase the number of available IP addresses for your Amazon Elastic Compute Cloud (Amazon EC2) nodes to increase the number of pods.
- Temporarily remove the PDB.
- Use the force update option.
The force update option doesn't recognize PDBs. Updates occur regardless of PDB issues by forcing the node to restart.
Note: If pods from a Kubernetes controller aren't spread across the nodes, then this option might cause downtime for your applications.
To use the force option, run the AWS CLI command similar to the following one:
$ aws eks update-nodegroup-version --cluster-name cluster-123 --nodegroup-name nodegroup-1234 --force
Run the following eksctl command:
$ eksctl upgrade nodegroup --cluster OneCluster --name managed-ng --force-upgrade
Troubleshooting PodDisruptionBudget eviction failures with CloudWatch Logs Insights
You can use Amazon CloudWatch Logs Insights to search through the Amazon EKS control plane log data. For more information, see Analyzing log data with CloudWatch Logs Insights.
Important: You can view log events in CloudWatch Logs only after you turn on control plane logging in a cluster. Before you select a time range to run queries in CloudWatch Logs Insights, verify that you turned on control plane logging. For more information, see How can I retrieve Amazon EKS control plane logs from CloudWatch Logs?
To identify the pod that failed eviction and the failure count, run a query similar to the following one:
fields @timestamp, @message | stats count(*) as count by objectRef.name | filter @logStream like /audit/ | filter user.username == "eks:node-manager" and requestURI like "eviction" and requestURI like "pod" and responseStatus.code > 400 | sort count desc
The maximum number of retries for an eviction pod is 20. If the count for a displayed pod is greater than or equal to 20 failures, then this is the pod that failed eviction.
To identify the pod disruption budget name that's blocking the preceding pod from being evicted, run the following query.
filter @logStream like /^kube-apiserver-audit/ | fields @logStream, @timestamp, @message | sort @timestamp desc | filter user.username == "eks:node-manager" and requestURI like "eviction" and requestURI like "pod_name" and responseStatus.code > 400 | limit 999 | display responseObject.details.causes.0.message,objectRef.name,objectRef.namespace,objectRef.resource
Note: Replace pod_name with your pod name.
The output has a message similar to following one, where pod_distruption_budget is the object that's causing the eviction failures:
The disruption budget pod_distruption_budget needs 1 healthy pods and has 1 currently
Error: Nodegroup health has issues other than AsgInstanceLaunchFailures, InstanceLimitExceeded, InsufficientFreeAddresses, ClusterUnreachable
If you receive this error message, then check the managed node group details and locate the health issues. For more information and troubleshooting, check for managed node group errors and the Amazon EKS issue API reference.
Error: InvalidParameterException: Launch template details can't be null for Custom ami type node group
An error occurred (InvalidParameterException) when calling the UpdateNodegroupVersion operation: You cannot specify the field kubernetesVersion when using custom AMIs.
For managed node groups with a custom AMI, you must create a new AMI version with the Kubernetes version that you want to upgrade to. During the upgrade, specify the launch template and the version.
If you're using the AWS CLI, then use the flag --launch-template. For eksctl, use the flag --launch-template-version.
Note: Avoid using the --kubernetes-version flag with these commands.
UPDATE_FAILED Resource handler returned message: "Requested release version 1.xx is not valid for kubernetes version 1.yy"
This error occurs when upgrading the managed node group with the Amazon EKS cluster from the same AWS CloudFormation stack with the UpdateStack API call.
CloudFormation tries to roll back the stack, but it fails because the Amazon EKS cluster upgraded successfully and can't be reverted. The Amazon EKS cluster can't match 1.xx with 1.yy (for example, 1.21 and 1.22).
Check the first error that occurred for the node group in the CloudFormation stack for more details on how to fix the issue. Then, update your CloudFormation stack again.
For more information, see Managed node update behavior.
How do I troubleshoot Amazon EKS managed node group creation failures?
How do I resolve managed node group errors in an Amazon EKS cluster?
- OFICIAL DE AWSActualizada hace 2 meses
- ¿Cómo soluciono los problemas comunes relacionados con los errores de actualización de grupos de nodos de Amazon EKS?OFICIAL DE AWSActualizada hace 2 meses
- OFICIAL DE AWSActualizada hace 3 meses
- ¿Cómo soluciono los problemas de las plantillas de lanzamiento personalizadas con los grupos de nodos administrados en Amazon EKS?OFICIAL DE AWSActualizada hace un mes