This message was deleted.
# general
a
This message was deleted.
t
That seems more like configurations in rancher-nodes. This is for nodes in a cluster that is administered by Rancher. That cluster is separated from rancher cluster.
h
you still need to open appropriate firewall ports for downstream clusters - rancher is not going to modify firewall ports
this doc has inbound rules for k3s: https://docs.k3s.io/installation/requirements?_highlight=firewa#inbound-rules-for-k3s-nodes If you are running RKE2 or RKE1, you will find similar doc for them
t
Maybe you are right, I don't get everything you are writing. But just to clarify. I have my rancher cluster and I have another cluster. Maybe that is called downstream cluster. It is made of 3 nodes, 2 nodes have ufw disabled and 1 has ufw enabled. If my cluster agent is running on the pod with ufw enabled it says: ERROR: https://[my hostname].internal/ping is not accessible (Could not resolve host: [my hostname].internal) If I disable ufw on that node it starts working. I have found some posts that experience the same problem and they are talking about: dnsPolicy: ClusterFirst Which seems to be what the cluster agent is using. If I change that to Default it starts working. But I dont want to change default settings for the cluster agent. I would like to know how to configure the ufw on nodes in my downstream cluster to allow traffic to my rancher cluster even with ClusterFirst as dnsPolicy.
h
I have my rancher cluster and I have another cluster. Maybe that is called downstream cluster.
If this "another cluster" was created from Rancher UI, then yes that is downstream cluster
> If my cluster agent is running on the pod with ufw enabled it says: > ERROR: https://[my hostname].internal/ping is not accessible (Could not resolve host: [my hostname].internal) > > If I disable ufw on that node it starts working. I am not familiar with UFW... but, lets take rancher out of the picture... from node where UFW is enabled, can you do:
Copy code
nslookup [my hostname].internal 

ping [my hostname].internal

nc -v [my hostname].internal 6443  ## this is for k3s  (for rke2 its port 9345)