This article originally appeared on Rye Terrell’s blog
So you’ve conjured up a Kubernetes cluster on top of LXD on your dev box. Cool. You’ve created a deployment, you’ve got a service directing traffic to it, and you can query it from your box. Sweet. Time to demo this to your boss!
“Hey boss,” starts your email, “check it out — I’ve got our product running in a k8s cluster! Just click here to see it for yourself: https://…”
Oops, what IP do you send your boss? You can’t use the internal LXD container IP. You can’t use the IP of your dev box, no traffic is going to reach the relevant container. Damn. What to do?
There’s actually a few ways to solve this. Here, I’ll cover an iptables one-liner that will forward traffic on a particular port to the proper container.
Let’s make sure we’re on the same page. First, I’ll create a “hello-world” deployment:
$ kubectl run hello-world --replicas=2 --labels="run=load-balancer-example" --image=gcr.io/google-samples/node-hello:1.0 --port=8080
Then I’ll create an associated service (with type NodePort, since I want to expose it externally):
$ kubectl expose deployment hello-world --type=NodePort --name=example-service
Now we should be in roughly the same place. Let’s grab the NodePort for our service:
$ kubectl describe services example-service
Name: example-service Namespace: default Labels: run=load-balancer-example Annotations: <none> Selector: run=load-balancer-example Type: NodePort IP: 10.152.183.175 Port: <unset> 8080/TCP TargetPort: 8080/TCP NodePort: <unset> 30386/TCP Endpoints: <none> Session Affinity: None External Traffic Policy: Cluster Events: <none>
And find one of the nodes it’s running on:
$ kubectl get pods --selector="run=load-balancer-example" --output=wide
NAME READY STATUS RESTARTS AGE IP NODE hello-world-58f9949f8-2cqw7 1/1 Running 0 1h 10.1.7.2 juju-2282c0-7 hello-world-58f9949f8-k5zvl 1/1 Running 0 1h 10.1.102.6 juju-2282c0-3
Next we’ll need to find the IP address associated with that node:
$ lxc info juju-2282c0-3 | grep eth0
eth0: inet 10.218.5.81 vethV8TI50
Finally, using the node IP and the NodePort information we just collected, we’ll set up an iptables rule (note that the port 8080 is the port I’ll expose on my host):
iptables -t nat -A PREROUTING -p tcp -i eth0 --dport 8080 -j DNAT --to-destination 10.218.5.81:30386
Feel free to use iptables-save and iptables-persistent to allow your new rule to survive a reboot.
Now we can test it out from another host (note that 22.214.171.124 is the IP of my host):
$ curl 126.96.36.199:8080 Hello Kubernetes!
Great! Alright, go finish that email.
On February 7th, technical lead Stephane Graber will be presenting a webinar for Ubuntu Product Month that will dive into how LXD works, what it does, how it can be used in the enterprise, and even provide an opportunity for Q&A.
Ubuntu offers all the training, software infrastructure, tools, services and support you need for your public and private clouds.
Introduction The focus for this week was on CEPH and LXD clustering, trying to get the last few remaining pieces to work together properly. We’ve tagged a couple more betas as we went through that. We’ve also spent a good chunk of time…
Event Information Date: March 27 – 29 City/State: San Jose, CA Location: San Jose McEnery Convention Center Booth: #1227 GTC is the premier AI and deep learning conference, providing unparalleled training, industry insights, and…
Introduction This past week the LXD team was meeting in Budapest, Hungary. We spent most of our times working on a number of issues targeted at the final 3.0 releases. @freeekanayaka worked with @stgraber to track down an fix a testing…