-
Notifications
You must be signed in to change notification settings - Fork 564
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Talos 1.8.3 advertising virtual MAC addresses #9837
Comments
First, please check MetalLB or anything else you're running on your host network. Talos only does forced advertisement for VIPs, but they are advertised with MAC address of the link. |
The pods running with Managed by Talos:
Added by us:
Via: openebs-dynamic-localpv-provisioner
For ingesting system logs into Loki, as suggested by Talos documentation here: https://www.talos.dev/v1.8/talos-guides/configuration/logging/#vector-example We are not using MetalLB as we are relying on Cloudflare tunnels for HTTP ingress, and NodePort for a pair of Postgres databases. Note that all of this has been running in our cluster since day one, and appear to be running fine on Talos 1.8.2 without triggering any MAC abuse reports. |
As we got another round of abuse reports for these servers, as well as one additional worker node which had also been upgraded to Talos 1.8.3, we have now downgraded all nodes to 1.8.2 to see if this prevents more reports from triggering. |
Bug Report
After upgrading some of our nodes from Talos 1.8.2 to 1.8.3 we've received MAC address abuse reports from Hetzner (we're deploying on Hetzner dedicated servers).
The reports state:
And proceed to give a list of unallowed MAC addresses used, a link to execute a re-check after resolving the issue, and a link to make a statement of why the MAC abuse occurred.
We've been running this Talos cluster on Hetzner for about two years and have only gotten reports like this in the last week after upgrading to Talos 1.8.3. So this upgrade is the only discrepancy we have to go on right now.
Description
Timeline:
control-plane-1
control-plane-1
from Hetznercontrol-plane-2
control-plane-1
from Hetznermixed-2
mixed-2
from HetznerOur network config is extremely simple. We run the default flannel CNI, get a public IP from Hetzner via DHCP and enable Kubespan, eg:
We've introspected the Talos network via
talosctl get links
, which does show a lot ofveth
devices, however none of them have matched the MAC addresses reported by Hetzner. We assume that the intention is for theveth
devices is to stay internal to the cluster network and not be advertised on the physical network.While our "mixed" worker is running all kinds of workloads. The 2 control plane nodes are tainted as control planes and are not running anything out of the ordinary.
When clicking the "re-check" link the report we get back is that the issue has been resolved. So these issues appears to have been transient. It's unclear if they can occur again, eg. when rebooting the nodes or similar. We don't know how to reproduce, or even how to monitor if unallowed MAC addresses are being advertised.
We don't mind spending time further troubleshooting this if someone can guide us in what to do.
For now we'll send a statement to Hetzner about the little we know, including a link to this issue, and hold off upgrading any other nodes for the time being.
Environment
1.8.3
v1.30.6
The text was updated successfully, but these errors were encountered: