Back to all scenarios
Scenario #11
Cluster Management
K8s v1.22, On-prem with kube-proxy in IPTables mode
kube-proxy IPTables Rules Overlap Breaking Networking
Services became unreachable due to overlapping custom IPTables rules with kube-proxy rules.
Find this helpful?
What Happened
A system admin added custom IPTables NAT rules for external routing, which inadvertently modified the same chains managed by kube-proxy.
Diagnosis Steps
- 1DNS and service access failing intermittently.
- 2Ran iptables-save | grep KUBE- – found modified chains.
- 3Checked kube-proxy logs: warnings about rule insert failures.
Root Cause
Manual IPTables rules conflicted with KUBE-SERVICES chains, causing rule precedence issues.
Fix/Workaround
• Flushed custom rules and reloaded kube-proxy.
bash
CopyEdit
iptables -F ; systemctl restart kube-proxy
Lessons Learned
Never mix manual IPTables rules with kube-proxy-managed chains.
How to Avoid
- 1Use separate IPTables chains or policy routing.
- 2Document any node-level firewall rules clearly.