1 réponse
- Le plus récent
- Le plus de votes
- La plupart des commentaires
0
Hello.
- Please check if your nat gateway has a public IP an configured in a public subnet.
- Ensure that DNS resolution and DNS hostnames are enabled for your VPC.
- Check if your security groups are allowing traffic between the EKS control plane and worker nodes.
Regards, Andrii
Thanks, Andrii. All three are checked. However, the problem still persists.
- Yes
$ aws ec2 describe-nat-gateways --nat-gateway-ids <my-nat-gateway-id> --query 'NatGateways[].NatGatewayAddresses[].PublicIp' [ "<correct-public-ip>" ]
- Yes
$ aws ec2 describe-vpc-attribute --vpc-id <my-vpc-id> --attribute enableDnsSupport { "VpcId": "<my-vpc-id>", "EnableDnsSupport": { "Value": true } } $ aws ec2 describe-vpc-attribute --vpc-id <my-vpc-id> --attribute enableDnsHostnames { "VpcId": "<my-vpc-id>", "EnableDnsHostnames": { "Value": true } }
- Yes, the security group of the the autoscaling group associated with the node group has both inbound and outbound allowing 0.0.0.0/0 all protocol, all port range, all type.
Contenus pertinents
- demandé il y a un an
- demandé il y a un an
- demandé il y a un an
- AWS OFFICIELA mis à jour il y a 2 ans
- AWS OFFICIELA mis à jour il y a un an
- AWS OFFICIELA mis à jour il y a un an
Did you manage to figure this out? I see similar issues when launch a node group in private subnet.