Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Sign in / Register
Toggle navigation
C
Coredns
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Locked Files
Issues
0
Issues
0
List
Boards
Labels
Service Desk
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Security & Compliance
Security & Compliance
Dependency List
License Compliance
Packages
Packages
List
Container Registry
Analytics
Analytics
CI / CD
Code Review
Insights
Issues
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Railgun
Coredns
Commits
9a393ac5
Commit
9a393ac5
authored
Dec 05, 2018
by
Chris O'Haver
Committed by
corbot[bot]
Dec 05, 2018
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
clean pre-submit checks (#2367)
Automatically submitted.
parent
59a49c5f
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
3 additions
and
3 deletions
+3
-3
plugin/loop/README.md
plugin/loop/README.md
+3
-3
No files found.
plugin/loop/README.md
View file @
9a393ac5
...
...
@@ -71,13 +71,13 @@ A common cause of forwarding loops in Kubernetes clusters is an interaction with
on the host node (e.g.
`systemd-resolved`
). For example, in certain configurations
`systemd-resolved`
will
put the loopback address
`127.0.0.53`
as a nameserver into
`/etc/resolv.conf`
. Kubernetes (via
`kubelet`
) by default
will pass this
`/etc/resolv/conf`
file to all Pods using the
`default`
dnsPolicy rendering them
unable to make DNS lookups (this includes CoreDNS Pods). CoreDNS uses this
`/etc/resolv.conf`
unable to make DNS lookups (this includes CoreDNS Pods). CoreDNS uses this
`/etc/resolv.conf`
as a list of upstreams to proxy/forward requests to. Since it contains a loopback address, CoreDNS ends up forwarding
requests to itself.
requests to itself.
There are many ways to work around this issue, some are listed here:
*
Add the following to
`kubelet`
:
`--resolv-conf <path-to-your-real-resolv-conf-file>`
. Your "real"
*
Add the following to
`kubelet`
:
`--resolv-conf <path-to-your-real-resolv-conf-file>`
. Your "real"
`resolv.conf`
is the one that contains the actual IPs of your upstream servers, and no local/loopback address.
This flag tells
`kubelet`
to pass an alternate
`resolv.conf`
to Pods. For systems using
`systemd-resolved`
,
`/run/systemd/resolve/resolv.conf`
is typically the location of the "real"
`resolv.conf`
,
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment