Skip to content

Commit b537645

Browse files
committed
Address review comments and add explain CSR monitor
1 parent 4bf61c8 commit b537645

File tree

1 file changed

+26
-3
lines changed

1 file changed

+26
-3
lines changed

calico-enterprise/getting-started/bare-metal/troubleshoot.mdx

Lines changed: 26 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Troubleshoot non-cluster hosts and VMs setup
44

55
# Troubleshoot non-cluster hosts and VMs setup
66

7-
This document provides guidance for troubleshooting non-cluster host setup for hosts and VMs.
7+
This document provides guidance for troubleshooting Calico running on hosts and VMs outside of a cluster.
88

99
## Useful commands
1010

@@ -24,21 +24,44 @@ kubectl logs -n calico-system -l k8s-app=calico-typha-noncluster-host
2424
kubectl logs -n tigera-manager -l k8s-app=tigera-manager -c tigera-voltron
2525
```
2626

27-
Monitor CertificateSigningRequests (CSR):
27+
You can monitor CertificateSigningRequests (CSR) by running:
2828

2929
```bash
3030
kubectl get certificatesigningrequest -w
3131
```
3232

33+
Monitoring CSRs is useful for debugging certificates used for Calico Node and Typha mutual TLS (mTLS) communication. The automatic CSR approval and signing flow can fail in several ways. For example:
34+
35+
- The CSR request might not be created or submitted correctly.
36+
- The Tigera Operator CSR controller might not process it.
37+
- The Tigera Operator signer might reject the request due to invalid fields or missing permission.
38+
39+
When such failure occur, the CSR status object contains detailed condition and error messages that help identify the root cause.
40+
3341
## Common problems
3442

3543
### No internet connection after installing the Calico Node package
3644

3745
By default, $[prodname] blocks all traffic to and from host interfaces. You can use a profile with host endpoints to modify default behavior. Apply the built-in profile `projectcalico-default-allow`, which allows all ingress and egress traffic. Host endpoints that use this profile will have *allow-all* behavior instead of *deny-all* when no network policy is applied.
3846

47+
Example `HostEndpoint` with the `projectcalico-default-allow` profile:
48+
49+
```yaml
50+
apiVersion: projectcalico.org/v3
51+
kind: HostEndpoint
52+
metadata:
53+
name: <endpoint-name>
54+
spec:
55+
interfaceName: <interface-name>
56+
node: <node-hostname>
57+
expectedIPs: ["<list-of-expected-ips>"]
58+
profiles:
59+
- projectcalico-default-allow
60+
```
61+
3962
### Certificate signed by unknown authority
4063
41-
If the certificate presented by the Kubernetes API server or Tigera Manager endpoint is not signed by a trusted Certificate Authority (CA), add the correct CA certificate to the system trust store. For the Calico fluent-bit log forwarding, you can temporarily disable TLS verification by setting:
64+
If the certificate presented by the Kubernetes API server or Tigera Manager endpoint is not signed by a trusted Certificate Authority (CA), add the correct CA certificate to the system trust store. Alternatively, for the Calico fluent-bit log forwarder, you can temporarily disable TLS verifications by setting:
4265
4366
```conf
4467
[OUTPUT]

0 commit comments

Comments
 (0)