Ensure that the routed Organization VDC network chosen during cluster creation has a valid DNS server configured.
For more information see the Cloud Director documentation Edit the DNS Settings of an Organization Virtual Data Center Network in the VMware Cloud Director Tenant Portal.
Once a valid DNS server is configured ensure that the appropriate NAT and Firewall rules are in place to allow VMs deployed on this routed Org VDC Network to resolve names using the DNS server for both DNS over TCP and DNS over UDP.
For more information see the Cloud Director documentation Managing NSX Edge Gateways in VMware Cloud Director Tenant Portal.
To verify the DNS server currently configured on an Ephemeral Temp VM, Control Plane Node, or Worker Node deployed during cluster creation, commands such as the following can be used:
resolvectl status ens192
For example if the routed Organization VDC network is configured with a DNS Server 192.168.1.2 and a domain example.com we would expect the following output:
resolvectl status ens192
Link 2 (ens192)
Current Scopes: DNS
DefaultRoute setting: yes
LLMNR setting: yes
MulticastDNS setting: no
DNSOverTLS setting: no
DNSSEC setting: no
DNSSEC supported: no
Current DNS Server: 192.168.1.2
DNS Servers: 192.168.1.2
DNS Domain: example.com
To test DNS on an Ephemeral Temp VM, Control Plane Node, or Worker Node deployed during cluster creation, commands such as the following can be used:
dig @<DNS_IP> <VCD_URL>
dig @<DNS_IP> <CONTAINER_REGISTRY_URL>
For example:
For more information on the network requirements see the VMware Cloud Director Container Service Extension Documentation, Organization Virtual Data Center Prerequisites for Kubernetes Cluster Deployment.
To generate logs from the Kubernetes External Cloud Provider for VMware Cloud Director (CCM) pods the generate-k8s-log-bundle.sh script can be used as per the documentation on VMware Cloud Director Container Service Extension, Troubleshooting.