Hi Vipal Mehta,
Welcome to the Microsoft Q&A Platform! Thank you for asking your question here.
Based on logs and context you provided, the issue seems to be connectivity to the Kubernetes API server (10.2.0.1:443) after cluster was started. The logs show EOF errors when trying to reach (10.2.0.1:443) which indicates the API server is not responding.
You can find below troubleshooting steps to check the connectivity to the AKS cluster's API server:
With the FQDN, check whether the API server is reachable from the client machine by using the name server lookup (nslookup), client URL (curl), and telnet commands:
Check if the DNS Resolution is working: $ nslookup <cluster-fqdn>
Then check if the API Server is reachable:
$ curl -Iv https://<cluster-fqdn>
$ telnet <cluster-fqdn> 443
Misconfigurations in the API server components or flags can also lead to connectivity issues. Check the kube-apiserver logs for any errors or warnings:
journalctl -u kube-apiserver -l
Resource constraints on the master node can impair the API server's functionality. Verify that the master node has sufficient resources (CPU, memory, disk) available:
kubectl top nodes
Ensure there are no issues with service account credentials or RBAC policies that might be preventing access to the API server.
SSL/TLS certificate issues can also prevent secure communication with the API server. Ensure that the certificates are properly configured and valid. Check the expiration date and renewal status of the certificates:
openssl x509 -in /etc/kubernetes/pki/apiserver.crt -noout -enddate
Enter the following az aks show command in Azure CLI. This command gets the fully qualified domain name (FQDN) of your AKS cluster configuration:
az aks show --resource-group <cluster-resource-group> --name <cluster-name> --query fqdn
Please check the below documents for reference:
Certificate rotation in Azure Kubernetes Service (AKS)
If you have any further queries, please do let us know. If the answer is helpful, please click "Accept Answer" and "Upvote it"