You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: support/azure/azure-kubernetes/availability-performance/cluster-service-health-probe-mode-issues.md
+156-9Lines changed: 156 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,8 +4,9 @@ description: Diagnoses and fixes common issues with the health probe mode featur
4
4
ms.date: 06/03/2024
5
5
ms.reviewer: niqi, cssakscic, v-weizhu
6
6
ms.service: azure-kubernetes-service
7
-
ms.custom: sap:Node/node pool availability and performance, devx-track-azurecli
7
+
ms.custom: sap:Node/node pool availability and performance, devx-track-azurecli, innovation-engine
8
8
---
9
+
9
10
# Troubleshoot issues when enabling the AKS cluster service health probe mode
10
11
11
12
The health probe mode feature allows you to configure how Azure Load Balancer probes the health of the nodes in your Azure Kubernetes Service (AKS) cluster. You can choose between two modes: Shared and ServiceNodePort. The Shared mode uses a single health probe for all external traffic policy cluster services that use the same load balancer. In contrast, the ServiceNodePort mode uses a separate health probe for each service. The Shared mode can reduce the number of health probes and improve the performance of the load balancer, but it requires some additional components to work properly. To enable this feature, see [How to enable the health probe mode feature using the Azure CLI](#how-to-enable-the-health-probe-mode-feature-using-the-azure-cli).
@@ -36,11 +37,92 @@ The following operations also happen:
36
37
37
38
To troubleshoot these issues, follow these steps:
38
39
39
-
1. Check the RP frontend log to see if the health probe mode in the LoadBalancerProfile is properly configured. You can use the `az aks show` command to view the LoadBalancerProfile property of your cluster.
40
-
41
-
2. Check the *overlaymgr* log to see if the cloud provider secret is updated. The keyword to look for is `cloudConfigSecretResolver`. Or check the contents of the cloud-provider-config secret in the `ccp` namespace. You can use the `kubectl get secret` command to view the secret.
42
-
43
-
3. Check the chart or overlay daemonset cloud-node-manager to see if the health-probe-proxy sidecar container is enabled. You can use the `kubectl get ds` command to view the daemonset.
40
+
1. First, connect to your AKS cluster using the Azure CLI:
41
+
42
+
```azurecli
43
+
export RESOURCE_GROUP="aks-rg"
44
+
export AKS_CLUSTER_NAME="aks-cluster"
45
+
az aks get-credentials --resource-group $RESOURCE_GROUP --name $AKS_CLUSTER_NAME --overwrite-existing
46
+
```
47
+
48
+
2. Next, check the RP frontend log to see if the health probe mode in the LoadBalancerProfile is properly configured. You can use the `az aks show` command to view the LoadBalancerProfile property of your cluster.
49
+
50
+
```azurecli
51
+
export RESOURCE_GROUP="aks-rg"
52
+
export AKS_CLUSTER_NAME="aks-cluster"
53
+
az aks show --resource-group $RESOURCE_GROUP --name $AKS_CLUSTER_NAME --query "networkProfile.loadBalancerProfile"
3. Check the cloud provider configuration. In modern AKS clusters, the cloud provider configuration is managed internally and the `ccp` namespace doesn't exist. Instead, check for cloud provider related resources and verify the cloud-node-manager pods are running properly:
78
+
79
+
80
+
```bash
81
+
# Check for cloud provider related ConfigMaps in kube-system
82
+
kubectl get configmap -n kube-system | grep -i azure
83
+
84
+
# Check if cloud-node-manager pods are running (indicates cloud provider integration is working)
85
+
kubectl get pods -n kube-system | grep cloud-node-manager
86
+
87
+
# Check the azure-ip-masq-agent-config if it exists
88
+
kubectl get configmap azure-ip-masq-agent-config-reconciled -n kube-system -o yaml 2>/dev/null || echo "ConfigMap not found"
4. Check the chart or overlay daemonset cloud-node-manager to see if the health-probe-proxy sidecar container is enabled. You can use the `kubectl get ds` command to view the daemonset.
101
+
102
+
```shell
103
+
kubectl get ds -n kube-system cloud-node-manager -o yaml
## Cause 1: The health probe mode isn't Shared or ServiceNodePort
46
128
@@ -74,6 +156,26 @@ The health probe mode feature requires you to register the feature on your subsc
74
156
75
157
Make sure you register the feature for your subscription before creating or updating your cluster. You can use the `az feature register` command to register the feature.
0 commit comments