[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-09-04。"],[],[],null,["# Resolving multi-cluster issues\n==============================\n\nThis section explains common Cloud Service Mesh problems and how to resolve\nthem. If you need additional assistance, see\n[Getting support](/service-mesh/v1.25/docs/getting-support).\n\nMissing secrets\n---------------\n\nThis section only applies to the in-cluster control plane and the managed\ncontrol plane with the Istiod implementation.\n\nCloud Service Mesh relies on a kubeconfig file embedded in the Kubernetes\nsecret for proper remote endpoint discovery. Without the secrets, users will\nalways see requests hit pods in the local cluster during cross-cluster load\nbalancing.\n\nVerify the secret has been created by running the following command in every\ncluster: \n\n kubectl get secret istio-remote-secret-\u003cvar translate=\"no\"\u003eCLUSTER_NAME\u003c/var\u003e_i -n istio-system\n\nVerify the expected output: \n\n NAME TYPE DATA AGE\n istio-remote-secret-CLUSTER_NAME_i Opaque 1 44s\n\nTo recover from this, delete all the remote secrets and re-run the `create-mesh`\ncommand.\n\nUnreachable API server\n----------------------\n\nThis section only applies to in-cluster control plane and managed\n(istiod implementation).\n\nThe control plane of Cloud Service Mesh needs to reach the API server of the\nremote cluster. The following situations can cause the remote cluster to become\nunreachable:\n\n- The remote cluster is deleted.\n- The remote cluster is a [private cluster](/kubernetes-engine/docs/concepts/private-cluster-concept) that does not have [global access](/kubernetes-engine/docs/how-to/private-clusters#enabling_control_plane_private_endpoint_global_access) enabled.\n- The remote cluster is a [private cluster](/kubernetes-engine/docs/concepts/private-cluster-concept) with [Master Authorized Network](/kubernetes-engine/docs/how-to/authorized-networks) enabled but the Cloud Service Mesh control plane IP has not been properly allowed using the allow list.\n\nGiven an unreachable API server, Istiod will output error messages in the log.\nUsers will always see requests hit the local pod during cross-cluster load\nbalancing.\n\nIn the [Logs Explorer](/logging/docs/view/logs-explorer-interface) interface,\nset the query `resource.type` to `istio_control_plane`.\n\nCheck to see if there are any invalid secret errors.\n\nTo recover from this problem, fix the underlying API server\nreachability issue. Next, delete all the remote secrets in every cluster and\nre-run the `create-mesh` command.\n\nMissing firewall rule\n---------------------\n\nWithout the proper firewall rule, users will experience a 10-second delay\nfollowed by a timeout when doing cross-cluster load balancing.\n\nTo recover from this, follow the steps outlined in\n[Create firewall rule](/service-mesh/v1.25/docs/unified-install/gke-install-multi-cluster#create_firewall_rule)."]]