Tectonic worker nodes are not assigned a public IP address, only the controller node. To debug a worker node, SSH to it through a controller (bastion host) or use a VPN connected to the internal network.
To do so, perform the following:
Once a passphrase of the local ssh key is added to
ssh-agent, you will not be prompted for the credentials the next time connecting to nodes via SSH or SCP. The following instructions outline adding a passphrase to the
ssh-agent on the system.
$ eval ssh-agent
ssh-add command prompts for a private key passphrase and adds it to the list maintained by
Enter your private key passphrase.
Before logging out, run the following:
$ kill $SSH_AGENT_PID
To automatically run this command when logging out, place it in the
.logout file if you are using csh or tcsh. Place the command in the
.bash_logout file if you are using bash.
Run the following command:
$ kubectl get nodes -o wide
A table of nodes and their IP addresses is displayed:
NAME STATUS AGE EXTERNAL-IP ip-192-0-2-18.us-west-2.compute.internal Ready 3d <none> ip-192-0-2-10.us-west-2.compute.internal Ready 3d 203.0.113.3 ip-192-0-2-12.us-west-2.compute.internal Ready 3d <none>
SSH to a controller node with its
EXTERNAL-IP, providing the
-A flag to forward the local
ssh-agent. Add the
-i option giving the location of the ssh key known to Tectonic:
$ ssh -A firstname.lastname@example.org -i /path/to/tectonic/cluster/ssh/key
The worker node is accessible from the controller because both machines are on the same private network, but the controller is the only public entry point into the cluster. From a controller, reach worker nodes on their internal cluster IP addresses. This address is encoded in the node's host name by convention. In this example, the worker node
ip-192-0-2-18.us-west-2.compute.internal listed by
kubectl get nodes -o wide has the internal IP 192.0.2.18.
Having connected to a controller, ssh from there to the target worker node's internal IP:
# From master node $ ssh email@example.com
View logs on the worker node by using
journalctl -xe or similar tools. Reading the system log has more information.