Kubernetes outgoing connections












1















I am going to keep this simple and ask, is there a way to see which pod have an active connection with an endpoint like a database endpoint?



My cluster contains a few hundred of namespace and my database provider just told me that the maximum amount of connections is almost reached and I want to pinpoint the pod(s) that uses multiple connections to our database endpoint at the same time.



I can see from my database cluster that the connections come from my cluster node's IP... but it won't say which pods... and I have quite lot of pods...



Thanks for the help










share|improve this question























  • you need a centeral monitoring solution to monitor such connections and alot of other things going on , you should be able to see those things before you DB guy tells you that.

    – Ijaz Ahmad Khan
    Nov 20 '18 at 21:28











  • You are right, I do need more monitoring, but those connections are not exactly intuitive to monitor.

    – Sartigan
    Nov 21 '18 at 15:00











  • Have you tried already the way of getting these statistics as suggested by Rico ? I tried to follow them exactly step by step and it didn`t work for me.

    – Nepomucen
    Nov 21 '18 at 17:08











  • netstat didnt return any established connection to our database endpoint... so... it did not work either

    – Sartigan
    Nov 21 '18 at 18:25
















1















I am going to keep this simple and ask, is there a way to see which pod have an active connection with an endpoint like a database endpoint?



My cluster contains a few hundred of namespace and my database provider just told me that the maximum amount of connections is almost reached and I want to pinpoint the pod(s) that uses multiple connections to our database endpoint at the same time.



I can see from my database cluster that the connections come from my cluster node's IP... but it won't say which pods... and I have quite lot of pods...



Thanks for the help










share|improve this question























  • you need a centeral monitoring solution to monitor such connections and alot of other things going on , you should be able to see those things before you DB guy tells you that.

    – Ijaz Ahmad Khan
    Nov 20 '18 at 21:28











  • You are right, I do need more monitoring, but those connections are not exactly intuitive to monitor.

    – Sartigan
    Nov 21 '18 at 15:00











  • Have you tried already the way of getting these statistics as suggested by Rico ? I tried to follow them exactly step by step and it didn`t work for me.

    – Nepomucen
    Nov 21 '18 at 17:08











  • netstat didnt return any established connection to our database endpoint... so... it did not work either

    – Sartigan
    Nov 21 '18 at 18:25














1












1








1








I am going to keep this simple and ask, is there a way to see which pod have an active connection with an endpoint like a database endpoint?



My cluster contains a few hundred of namespace and my database provider just told me that the maximum amount of connections is almost reached and I want to pinpoint the pod(s) that uses multiple connections to our database endpoint at the same time.



I can see from my database cluster that the connections come from my cluster node's IP... but it won't say which pods... and I have quite lot of pods...



Thanks for the help










share|improve this question














I am going to keep this simple and ask, is there a way to see which pod have an active connection with an endpoint like a database endpoint?



My cluster contains a few hundred of namespace and my database provider just told me that the maximum amount of connections is almost reached and I want to pinpoint the pod(s) that uses multiple connections to our database endpoint at the same time.



I can see from my database cluster that the connections come from my cluster node's IP... but it won't say which pods... and I have quite lot of pods...



Thanks for the help







database kubernetes






share|improve this question













share|improve this question











share|improve this question




share|improve this question










asked Nov 20 '18 at 19:17









SartiganSartigan

106




106













  • you need a centeral monitoring solution to monitor such connections and alot of other things going on , you should be able to see those things before you DB guy tells you that.

    – Ijaz Ahmad Khan
    Nov 20 '18 at 21:28











  • You are right, I do need more monitoring, but those connections are not exactly intuitive to monitor.

    – Sartigan
    Nov 21 '18 at 15:00











  • Have you tried already the way of getting these statistics as suggested by Rico ? I tried to follow them exactly step by step and it didn`t work for me.

    – Nepomucen
    Nov 21 '18 at 17:08











  • netstat didnt return any established connection to our database endpoint... so... it did not work either

    – Sartigan
    Nov 21 '18 at 18:25



















  • you need a centeral monitoring solution to monitor such connections and alot of other things going on , you should be able to see those things before you DB guy tells you that.

    – Ijaz Ahmad Khan
    Nov 20 '18 at 21:28











  • You are right, I do need more monitoring, but those connections are not exactly intuitive to monitor.

    – Sartigan
    Nov 21 '18 at 15:00











  • Have you tried already the way of getting these statistics as suggested by Rico ? I tried to follow them exactly step by step and it didn`t work for me.

    – Nepomucen
    Nov 21 '18 at 17:08











  • netstat didnt return any established connection to our database endpoint... so... it did not work either

    – Sartigan
    Nov 21 '18 at 18:25

















you need a centeral monitoring solution to monitor such connections and alot of other things going on , you should be able to see those things before you DB guy tells you that.

– Ijaz Ahmad Khan
Nov 20 '18 at 21:28





you need a centeral monitoring solution to monitor such connections and alot of other things going on , you should be able to see those things before you DB guy tells you that.

– Ijaz Ahmad Khan
Nov 20 '18 at 21:28













You are right, I do need more monitoring, but those connections are not exactly intuitive to monitor.

– Sartigan
Nov 21 '18 at 15:00





You are right, I do need more monitoring, but those connections are not exactly intuitive to monitor.

– Sartigan
Nov 21 '18 at 15:00













Have you tried already the way of getting these statistics as suggested by Rico ? I tried to follow them exactly step by step and it didn`t work for me.

– Nepomucen
Nov 21 '18 at 17:08





Have you tried already the way of getting these statistics as suggested by Rico ? I tried to follow them exactly step by step and it didn`t work for me.

– Nepomucen
Nov 21 '18 at 17:08













netstat didnt return any established connection to our database endpoint... so... it did not work either

– Sartigan
Nov 21 '18 at 18:25





netstat didnt return any established connection to our database endpoint... so... it did not work either

– Sartigan
Nov 21 '18 at 18:25












2 Answers
2






active

oldest

votes


















0














The easiest way is to run netstat on all your Kubernetes nodes:



$ netstat -tunaple | grep ESTABLISHED | grep <ip address of db provider>


The last column is the PID/Program name column, and that's a program that is running in a container (with a different internal container PID) in your pod on that specific node. There are all kinds of different ways to find out which container/pod it is. For example,



# Loop through all containers on the node with
$ docker top <container-id>


Then after you find the container id, if you look through all your pods:



$ kubectl get pod <pod-id> -o=yaml


And you can find the status, for example:



  status:
conditions:
- lastProbeTime: null
lastTransitionTime: 2018-11-09T23:01:36Z
status: "True"
type: Initialized
- lastProbeTime: null
lastTransitionTime: 2018-11-09T23:01:38Z
status: "True"
type: Ready
- lastProbeTime: null
lastTransitionTime: 2018-11-09T23:01:38Z
status: "True"
type: ContainersReady
- lastProbeTime: null
lastTransitionTime: 2018-11-09T23:01:36Z
status: "True"
type: PodScheduled
containerStatuses:
- containerID: docker://f64425b3cd0da74a323440bcb03d8f2cd95d3d9b834f8ca5c43220eb5306005d





share|improve this answer































    0














    Each container uses its own network namespace, so to check the network connection inside the container namespace you need to run command inside that namespace.



    Luckily all containers in a Pod share the same network namespace, so you can add small sidecar container to the pod that print to the log open connections.



    Alternatively, you can run netstat command inside the pod (if the pod has it on its filesystem):



    kubectl get pods | grep Running | awk '{ print $1 }' | xargs -I % sh -c 'echo == Pod %; kubectl exec -ti % -- netstat -tunaple' >netstat.txt
    # or
    kubectl get pods | grep Running | awk '{ print $1 }' | xargs -I % sh -c 'echo == Pod %; kubectl exec -ti % -- netstat -tunaple | grep ESTABLISHED' >netstat.txt


    After that you'll have a file on your disk (netstat.txt) with all information about connections in the pods.



    The third way is most complex. You need to find the container ID using docker ps and run the following command to get PID



    $ pid = "$(docker inspect -f '{{.State.Pid}}' "container_name | Uuid")"


    Then, you need to create named namespace:
    (you can use any name you want, or container_name/Uuid/Pod_Name as a replacement to namespace_name)



    sudo mkdir -p /var/run/netns
    sudo ln -sf /proc/$pid/ns/net "/var/run/netns/namespace_name"


    Now you can run commands in that namespace:



    sudo ip netns exec "namespace_name" netstat -tunaple | grep ESTABLISHED


    You need to do that for each pod on each node. So, it might be useful to troubleshoot particular containers, but it needs some more automation for your task.



    It might be helpful for you to install Istio to your cluster. It has several interesting features mentioned in this answer






    share|improve this answer

























      Your Answer






      StackExchange.ifUsing("editor", function () {
      StackExchange.using("externalEditor", function () {
      StackExchange.using("snippets", function () {
      StackExchange.snippets.init();
      });
      });
      }, "code-snippets");

      StackExchange.ready(function() {
      var channelOptions = {
      tags: "".split(" "),
      id: "1"
      };
      initTagRenderer("".split(" "), "".split(" "), channelOptions);

      StackExchange.using("externalEditor", function() {
      // Have to fire editor after snippets, if snippets enabled
      if (StackExchange.settings.snippets.snippetsEnabled) {
      StackExchange.using("snippets", function() {
      createEditor();
      });
      }
      else {
      createEditor();
      }
      });

      function createEditor() {
      StackExchange.prepareEditor({
      heartbeatType: 'answer',
      autoActivateHeartbeat: false,
      convertImagesToLinks: true,
      noModals: true,
      showLowRepImageUploadWarning: true,
      reputationToPostImages: 10,
      bindNavPrevention: true,
      postfix: "",
      imageUploader: {
      brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
      contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
      allowUrls: true
      },
      onDemand: true,
      discardSelector: ".discard-answer"
      ,immediatelyShowMarkdownHelp:true
      });


      }
      });














      draft saved

      draft discarded


















      StackExchange.ready(
      function () {
      StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53400039%2fkubernetes-outgoing-connections%23new-answer', 'question_page');
      }
      );

      Post as a guest















      Required, but never shown

























      2 Answers
      2






      active

      oldest

      votes








      2 Answers
      2






      active

      oldest

      votes









      active

      oldest

      votes






      active

      oldest

      votes









      0














      The easiest way is to run netstat on all your Kubernetes nodes:



      $ netstat -tunaple | grep ESTABLISHED | grep <ip address of db provider>


      The last column is the PID/Program name column, and that's a program that is running in a container (with a different internal container PID) in your pod on that specific node. There are all kinds of different ways to find out which container/pod it is. For example,



      # Loop through all containers on the node with
      $ docker top <container-id>


      Then after you find the container id, if you look through all your pods:



      $ kubectl get pod <pod-id> -o=yaml


      And you can find the status, for example:



        status:
      conditions:
      - lastProbeTime: null
      lastTransitionTime: 2018-11-09T23:01:36Z
      status: "True"
      type: Initialized
      - lastProbeTime: null
      lastTransitionTime: 2018-11-09T23:01:38Z
      status: "True"
      type: Ready
      - lastProbeTime: null
      lastTransitionTime: 2018-11-09T23:01:38Z
      status: "True"
      type: ContainersReady
      - lastProbeTime: null
      lastTransitionTime: 2018-11-09T23:01:36Z
      status: "True"
      type: PodScheduled
      containerStatuses:
      - containerID: docker://f64425b3cd0da74a323440bcb03d8f2cd95d3d9b834f8ca5c43220eb5306005d





      share|improve this answer




























        0














        The easiest way is to run netstat on all your Kubernetes nodes:



        $ netstat -tunaple | grep ESTABLISHED | grep <ip address of db provider>


        The last column is the PID/Program name column, and that's a program that is running in a container (with a different internal container PID) in your pod on that specific node. There are all kinds of different ways to find out which container/pod it is. For example,



        # Loop through all containers on the node with
        $ docker top <container-id>


        Then after you find the container id, if you look through all your pods:



        $ kubectl get pod <pod-id> -o=yaml


        And you can find the status, for example:



          status:
        conditions:
        - lastProbeTime: null
        lastTransitionTime: 2018-11-09T23:01:36Z
        status: "True"
        type: Initialized
        - lastProbeTime: null
        lastTransitionTime: 2018-11-09T23:01:38Z
        status: "True"
        type: Ready
        - lastProbeTime: null
        lastTransitionTime: 2018-11-09T23:01:38Z
        status: "True"
        type: ContainersReady
        - lastProbeTime: null
        lastTransitionTime: 2018-11-09T23:01:36Z
        status: "True"
        type: PodScheduled
        containerStatuses:
        - containerID: docker://f64425b3cd0da74a323440bcb03d8f2cd95d3d9b834f8ca5c43220eb5306005d





        share|improve this answer


























          0












          0








          0







          The easiest way is to run netstat on all your Kubernetes nodes:



          $ netstat -tunaple | grep ESTABLISHED | grep <ip address of db provider>


          The last column is the PID/Program name column, and that's a program that is running in a container (with a different internal container PID) in your pod on that specific node. There are all kinds of different ways to find out which container/pod it is. For example,



          # Loop through all containers on the node with
          $ docker top <container-id>


          Then after you find the container id, if you look through all your pods:



          $ kubectl get pod <pod-id> -o=yaml


          And you can find the status, for example:



            status:
          conditions:
          - lastProbeTime: null
          lastTransitionTime: 2018-11-09T23:01:36Z
          status: "True"
          type: Initialized
          - lastProbeTime: null
          lastTransitionTime: 2018-11-09T23:01:38Z
          status: "True"
          type: Ready
          - lastProbeTime: null
          lastTransitionTime: 2018-11-09T23:01:38Z
          status: "True"
          type: ContainersReady
          - lastProbeTime: null
          lastTransitionTime: 2018-11-09T23:01:36Z
          status: "True"
          type: PodScheduled
          containerStatuses:
          - containerID: docker://f64425b3cd0da74a323440bcb03d8f2cd95d3d9b834f8ca5c43220eb5306005d





          share|improve this answer













          The easiest way is to run netstat on all your Kubernetes nodes:



          $ netstat -tunaple | grep ESTABLISHED | grep <ip address of db provider>


          The last column is the PID/Program name column, and that's a program that is running in a container (with a different internal container PID) in your pod on that specific node. There are all kinds of different ways to find out which container/pod it is. For example,



          # Loop through all containers on the node with
          $ docker top <container-id>


          Then after you find the container id, if you look through all your pods:



          $ kubectl get pod <pod-id> -o=yaml


          And you can find the status, for example:



            status:
          conditions:
          - lastProbeTime: null
          lastTransitionTime: 2018-11-09T23:01:36Z
          status: "True"
          type: Initialized
          - lastProbeTime: null
          lastTransitionTime: 2018-11-09T23:01:38Z
          status: "True"
          type: Ready
          - lastProbeTime: null
          lastTransitionTime: 2018-11-09T23:01:38Z
          status: "True"
          type: ContainersReady
          - lastProbeTime: null
          lastTransitionTime: 2018-11-09T23:01:36Z
          status: "True"
          type: PodScheduled
          containerStatuses:
          - containerID: docker://f64425b3cd0da74a323440bcb03d8f2cd95d3d9b834f8ca5c43220eb5306005d






          share|improve this answer












          share|improve this answer



          share|improve this answer










          answered Nov 20 '18 at 19:49









          RicoRico

          27.6k94865




          27.6k94865

























              0














              Each container uses its own network namespace, so to check the network connection inside the container namespace you need to run command inside that namespace.



              Luckily all containers in a Pod share the same network namespace, so you can add small sidecar container to the pod that print to the log open connections.



              Alternatively, you can run netstat command inside the pod (if the pod has it on its filesystem):



              kubectl get pods | grep Running | awk '{ print $1 }' | xargs -I % sh -c 'echo == Pod %; kubectl exec -ti % -- netstat -tunaple' >netstat.txt
              # or
              kubectl get pods | grep Running | awk '{ print $1 }' | xargs -I % sh -c 'echo == Pod %; kubectl exec -ti % -- netstat -tunaple | grep ESTABLISHED' >netstat.txt


              After that you'll have a file on your disk (netstat.txt) with all information about connections in the pods.



              The third way is most complex. You need to find the container ID using docker ps and run the following command to get PID



              $ pid = "$(docker inspect -f '{{.State.Pid}}' "container_name | Uuid")"


              Then, you need to create named namespace:
              (you can use any name you want, or container_name/Uuid/Pod_Name as a replacement to namespace_name)



              sudo mkdir -p /var/run/netns
              sudo ln -sf /proc/$pid/ns/net "/var/run/netns/namespace_name"


              Now you can run commands in that namespace:



              sudo ip netns exec "namespace_name" netstat -tunaple | grep ESTABLISHED


              You need to do that for each pod on each node. So, it might be useful to troubleshoot particular containers, but it needs some more automation for your task.



              It might be helpful for you to install Istio to your cluster. It has several interesting features mentioned in this answer






              share|improve this answer






























                0














                Each container uses its own network namespace, so to check the network connection inside the container namespace you need to run command inside that namespace.



                Luckily all containers in a Pod share the same network namespace, so you can add small sidecar container to the pod that print to the log open connections.



                Alternatively, you can run netstat command inside the pod (if the pod has it on its filesystem):



                kubectl get pods | grep Running | awk '{ print $1 }' | xargs -I % sh -c 'echo == Pod %; kubectl exec -ti % -- netstat -tunaple' >netstat.txt
                # or
                kubectl get pods | grep Running | awk '{ print $1 }' | xargs -I % sh -c 'echo == Pod %; kubectl exec -ti % -- netstat -tunaple | grep ESTABLISHED' >netstat.txt


                After that you'll have a file on your disk (netstat.txt) with all information about connections in the pods.



                The third way is most complex. You need to find the container ID using docker ps and run the following command to get PID



                $ pid = "$(docker inspect -f '{{.State.Pid}}' "container_name | Uuid")"


                Then, you need to create named namespace:
                (you can use any name you want, or container_name/Uuid/Pod_Name as a replacement to namespace_name)



                sudo mkdir -p /var/run/netns
                sudo ln -sf /proc/$pid/ns/net "/var/run/netns/namespace_name"


                Now you can run commands in that namespace:



                sudo ip netns exec "namespace_name" netstat -tunaple | grep ESTABLISHED


                You need to do that for each pod on each node. So, it might be useful to troubleshoot particular containers, but it needs some more automation for your task.



                It might be helpful for you to install Istio to your cluster. It has several interesting features mentioned in this answer






                share|improve this answer




























                  0












                  0








                  0







                  Each container uses its own network namespace, so to check the network connection inside the container namespace you need to run command inside that namespace.



                  Luckily all containers in a Pod share the same network namespace, so you can add small sidecar container to the pod that print to the log open connections.



                  Alternatively, you can run netstat command inside the pod (if the pod has it on its filesystem):



                  kubectl get pods | grep Running | awk '{ print $1 }' | xargs -I % sh -c 'echo == Pod %; kubectl exec -ti % -- netstat -tunaple' >netstat.txt
                  # or
                  kubectl get pods | grep Running | awk '{ print $1 }' | xargs -I % sh -c 'echo == Pod %; kubectl exec -ti % -- netstat -tunaple | grep ESTABLISHED' >netstat.txt


                  After that you'll have a file on your disk (netstat.txt) with all information about connections in the pods.



                  The third way is most complex. You need to find the container ID using docker ps and run the following command to get PID



                  $ pid = "$(docker inspect -f '{{.State.Pid}}' "container_name | Uuid")"


                  Then, you need to create named namespace:
                  (you can use any name you want, or container_name/Uuid/Pod_Name as a replacement to namespace_name)



                  sudo mkdir -p /var/run/netns
                  sudo ln -sf /proc/$pid/ns/net "/var/run/netns/namespace_name"


                  Now you can run commands in that namespace:



                  sudo ip netns exec "namespace_name" netstat -tunaple | grep ESTABLISHED


                  You need to do that for each pod on each node. So, it might be useful to troubleshoot particular containers, but it needs some more automation for your task.



                  It might be helpful for you to install Istio to your cluster. It has several interesting features mentioned in this answer






                  share|improve this answer















                  Each container uses its own network namespace, so to check the network connection inside the container namespace you need to run command inside that namespace.



                  Luckily all containers in a Pod share the same network namespace, so you can add small sidecar container to the pod that print to the log open connections.



                  Alternatively, you can run netstat command inside the pod (if the pod has it on its filesystem):



                  kubectl get pods | grep Running | awk '{ print $1 }' | xargs -I % sh -c 'echo == Pod %; kubectl exec -ti % -- netstat -tunaple' >netstat.txt
                  # or
                  kubectl get pods | grep Running | awk '{ print $1 }' | xargs -I % sh -c 'echo == Pod %; kubectl exec -ti % -- netstat -tunaple | grep ESTABLISHED' >netstat.txt


                  After that you'll have a file on your disk (netstat.txt) with all information about connections in the pods.



                  The third way is most complex. You need to find the container ID using docker ps and run the following command to get PID



                  $ pid = "$(docker inspect -f '{{.State.Pid}}' "container_name | Uuid")"


                  Then, you need to create named namespace:
                  (you can use any name you want, or container_name/Uuid/Pod_Name as a replacement to namespace_name)



                  sudo mkdir -p /var/run/netns
                  sudo ln -sf /proc/$pid/ns/net "/var/run/netns/namespace_name"


                  Now you can run commands in that namespace:



                  sudo ip netns exec "namespace_name" netstat -tunaple | grep ESTABLISHED


                  You need to do that for each pod on each node. So, it might be useful to troubleshoot particular containers, but it needs some more automation for your task.



                  It might be helpful for you to install Istio to your cluster. It has several interesting features mentioned in this answer







                  share|improve this answer














                  share|improve this answer



                  share|improve this answer








                  edited Jan 24 at 16:06

























                  answered Jan 21 at 14:25









                  VASVAS

                  2,3261211




                  2,3261211






























                      draft saved

                      draft discarded




















































                      Thanks for contributing an answer to Stack Overflow!


                      • Please be sure to answer the question. Provide details and share your research!

                      But avoid



                      • Asking for help, clarification, or responding to other answers.

                      • Making statements based on opinion; back them up with references or personal experience.


                      To learn more, see our tips on writing great answers.




                      draft saved


                      draft discarded














                      StackExchange.ready(
                      function () {
                      StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53400039%2fkubernetes-outgoing-connections%23new-answer', 'question_page');
                      }
                      );

                      Post as a guest















                      Required, but never shown





















































                      Required, but never shown














                      Required, but never shown












                      Required, but never shown







                      Required, but never shown

































                      Required, but never shown














                      Required, but never shown












                      Required, but never shown







                      Required, but never shown







                      Popular posts from this blog

                      MongoDB - Not Authorized To Execute Command

                      in spring boot 2.1 many test slices are not allowed anymore due to multiple @BootstrapWith

                      Npm cannot find a required file even through it is in the searched directory