Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

TLS Passthrough Issue: POD IP Not Updating in VPC Lattice Registered Targets #669

Open
infinitydon opened this issue Oct 24, 2024 · 1 comment

Comments

@infinitydon
Copy link

Hi,

Currently having an issue while trying out the TLS passthrough feature, the POD IP is not getting updated in the VPC Lattice Registered targets when there is a change in the POD IP.

An example of when this happens is if the deployment is scaled down and up.

  • Status before scaling the deployment to zero
kubectl -n core5g get po -o wide
NAME                                       READY   STATUS    RESTARTS   AGE    IP           NODE                                        NOMINATED NODE   READINESS GATES
telco-5g-nrf-deployment-5dbbdb97df-r9c7w   1/1     Running   0          114s   10.0.31.102   ip-10-0-28-105.us-west-2.compute.internal   <none>           <none>
  • Status after scaling the deployment to one:
kubectl -n core5g get po -o wide
NAME                                       READY   STATUS    RESTARTS   AGE   IP            NODE                                        NOMINATED NODE   READINESS GATES
telco-5g-nrf-deployment-5dbbdb97df-x7rgf   1/1     Running   0          5s    10.0.23.231   ip-10-0-28-105.us-west-2.compute.internal   <none>           <none>

But when I check the Registered targets, the IP remains 10.0.31.102 instead of reflecting the new POD IP 10.0.23.231.

image

Expectation is that Registered target IP should always reflect the active POD IP in the EKS cluster.

@mihaelabalas84
Copy link

We faced the exact same issue in our tests.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants