You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Add initial framework for troubleshooting admission controller * Add containers/troubleshooting/admission controller to menu * Add overview & common problems * Add cluster agent status/logs section * Add networking and pod restrictions * Grammar and small fixes * Update further reading/troubleshooting links for new doc * More fixes, take out OpenShift SCC due to SELinux constraints * Apply suggestions from code review * significantly moving and editing things * Add referrals to Kubernetes>Distributions page for more details --------- Co-authored-by: cecilia saixue watt <cecilia.watt@datadoghq.com>
text: "Use library injection to auto-instrument tracing for Kubernetes applications with Datadog APM"
@@ -185,22 +188,7 @@ Possible options:
185
188
186
189
## Troubleshooting
187
190
188
-
- The Admission Controller needs to be deployed and configured before the creation of new application Pods. It cannot update Pods that already exist.
189
-
190
-
View the Cluster Agent logs to ensure the Admission Controller has started successfully. Observe the following `INFO` logs:
191
-
192
-
```
193
-
<date/time> | CLUSTER | INFO | (pkg/clusteragent/admission/api_discovery.go:122 in useAdmissionV1) | Group version 'admissionregistration.k8s.io/v1' is available, using it
194
-
<date/time> | CLUSTER | INFO | (pkg/clusteragent/admission/controllers/secret/controller.go:74 in Run) | Starting secrets controller for <namespace>/webhook-certificate
195
-
<date/time> | CLUSTER | INFO | (pkg/clusteragent/admission/controllers/webhook/controller_v1.go:76 in Run) | Starting webhook
196
-
```
197
-
198
-
- To disable the Admission Controller injection feature, use the Cluster Agent configuration: `DD_ADMISSION_CONTROLLER_INJECT_CONFIG_ENABLED=false`
199
-
- By using the Datadog Admission Controller, users can skip configuring the application Pods using downward API ([step 2 in Kubernetes Trace Collection setup][3]).
200
-
- Private clusters need specific networking rules because Datadog's Admission Controller webhook receives requests on port `443` and directs to a service on port `8000`:
201
-
- In a GKE private cluster, you need to [add a firewall rule for the control plane][4]. By default, the network for the cluster should have a firewall rule named `gke-<CLUSTER_NAME>-master`. This rule's source filters match the cluster's control plane address range. Edit this firewall rule to allow ingress to the TCP port `8000`.
202
-
- In an EKS private cluster, you need to [add an inbound rule for the node security group][5], where the Datadog Cluster Agent is located. Edit this rule to allow TCP port `8000` with the `Source` referencing the cluster security group (automatically created by AWS corresponding to the EKS control plane).
0 commit comments