VMware NSX
VMware Container Networking with Antrea
Interworking Pod connects to NSX 443 (HTTPS), 1234 (NSX-RPC), 1235 (NSX-RPC). If any host firewall is configured between Antrea pods and NSX, you need to allow egress traffic to these TCP ports.
The source IP of these connections is interworking Pod but the Pod can be scheduled to any K8s node in the cluster. The interworking Pod uses hostNetwork (= node network) So the source IP can possible be any node IP. Hence you need to make sure we have reachability to each K8s node.
kubectl get pods -o wide -n vmware-system-antrea
Then note down the interworking-xxxx Pod name.kubectl logs [--tail=100] [-p] [-f] interworking-xxxx -c ccp-adapter -n vmware-system-antrea > ccp-adapter.log
kubectl logs [--tail=100] [-p] [-f] interworking-xxxx -c mp-adapter -n vmware-system-antrea > mp-adapter.log
kubectl logs [--tail=100] [-p] [-f] interworking-xxxx -c tn-proxy -n vmware-system-antrea > tn-proxy.log
kubectl exec -it interworking-xxx -c tn-proxy -n vmware-system-antrea -- nsx-appctl -t /var/run/vmware/nsx-proxy/nsx-proxy-cli get/aph-conn-status
{"aph connection status":[{"UUID":"########-####-####-####-########e846","STATUS":"CONNECTED"},{"UUID":"########-####-####-####-########2e12","STATUS":"CONNECTED"},{"UUID":"########-####-####-####-########6691","STATUS":"CONNECTED"}]}