Skip to content

Commit

Permalink
clean pre-submit checks (#2367)
Browse files Browse the repository at this point in the history
Automatically submitted.
  • Loading branch information
chrisohaver authored and corbot[bot] committed Dec 5, 2018
1 parent 59a49c5 commit 9a393ac
Showing 1 changed file with 3 additions and 3 deletions.
6 changes: 3 additions & 3 deletions plugin/loop/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -71,13 +71,13 @@ A common cause of forwarding loops in Kubernetes clusters is an interaction with
on the host node (e.g. `systemd-resolved`). For example, in certain configurations `systemd-resolved` will
put the loopback address `127.0.0.53` as a nameserver into `/etc/resolv.conf`. Kubernetes (via `kubelet`) by default
will pass this `/etc/resolv/conf` file to all Pods using the `default` dnsPolicy rendering them
unable to make DNS lookups (this includes CoreDNS Pods). CoreDNS uses this `/etc/resolv.conf`
unable to make DNS lookups (this includes CoreDNS Pods). CoreDNS uses this `/etc/resolv.conf`
as a list of upstreams to proxy/forward requests to. Since it contains a loopback address, CoreDNS ends up forwarding
requests to itself.
requests to itself.

There are many ways to work around this issue, some are listed here:

* Add the following to `kubelet`: `--resolv-conf <path-to-your-real-resolv-conf-file>`. Your "real"
* Add the following to `kubelet`: `--resolv-conf <path-to-your-real-resolv-conf-file>`. Your "real"
`resolv.conf` is the one that contains the actual IPs of your upstream servers, and no local/loopback address.
This flag tells `kubelet` to pass an alternate `resolv.conf` to Pods. For systems using `systemd-resolved`,
`/run/systemd/resolve/resolv.conf` is typically the location of the "real" `resolv.conf`,
Expand Down

0 comments on commit 9a393ac

Please sign in to comment.