An Azure service that provides serverless Kubernetes, an integrated continuous integration and continuous delivery experience, and enterprise-grade security and governance.
Hi Satish Thamarana,
If you have implemented network policies, they might be blocking communication. Run the command:
kubectl get networkpolicies -A
Look for any custom policies that may restrict traffic between namespaces.
Confirm that the service definitions are correct and that the pods are properly registered as endpoints for those services:
kubectl get services -n <namespace-name>
Then check if the pod IPs are included in the service's endpoints:
kubectl describe services <service-name> -n <namespace-name>
Check the logs of the pods that cannot communicate. This can provide insights into any errors they might be encountering:
kubectl logs <pod-name> -n <namespace-name>
Use a test pod to verify connectivity between the pods. You can create a test pod and install necessary utilities:
kubectl run -it --rm aks-ssh --namespace <namespace> --image=debian:stable -- /bin/bash apt-get update -y && apt-get install dnsutils curl netcat-openbsd -y
Then, try reaching the target pod:
curl -Iv http://<pod-ip-address>:<port>
If you're communicating with external endpoints, check any associated Network Security Groups (NSGs) to ensure the necessary ports are open.
Finally, if you’re using Azure services that the pods need to access, ensure that the proper service endpoints or private links are configured correctly.
If you found information helpful, please click "Upvote" on the post to let us know.
If the issue still persist feel free to ask us we are happy to assist you.
Thank You.