-
Notifications
You must be signed in to change notification settings - Fork 306
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Azure CNI support for dedicated subnets #1788
Comments
Do you plan to allow configuration of different subnets for different pods? What has happened with multitenancy in Azure CNI? Azure/azure-container-networking@37eed02?short_path=2ac40eb#diff-2ac40ebea97cc7ab31e945192f9f1411 |
This capability will allow you to use multiple subnets for Pods where each Pod subnet is used within 1 or more node pools. @mkosieradzki - i didnt understand your question on multitenant CNI |
How does this issue differ from #1338 ? This one show in Development for Azure Public and the other shows as Private Preview. |
1338 is about creating nodepools in different subnets, the nodes and pods of those nodepools still use the same CIDR. This feature is about giving pods different CIDRs than those of the nodes. And also dynamic allocation of pod IPs. |
Any idea when this is coming to EastUS2? |
@jabbera - we are aiming to make this capability available in all regions by mid-May. |
@aanandr many thanks! Can't wait. |
Question. Can I use the node pool subnet for this to just enable the dynamic allocation of addresses or do you have to use a different subnet? |
@djsly - we will have more regions supported in a couple of more months. Widows support is also in the roadmap but i dont have a clear ETA. |
@aanandr is it dependant on container support on windows ? |
@djsly - the expansion to other regions is not dependent on supporting the capability on Windows. We are rolling the changes to other regions and that will take some time. Sorry if my answer was confusing. |
I meant, the support for windows, what is blocking it, is it a networking dependancy, do you guys need to wait for window to move to containerd, etc ? |
Windows support requires some changes in our CNIv2 implementation. The current implementation only support Linux. |
It should really be documented that this requires tearing down your cluster to enable. |
@aanandr @palma21 If you use an ARM Template to set the pod subnet you cannot re-rerun the template. This is a deal breaker for us.
|
@jabbera - sorry for the delayed response. Can you describe what you were trying to exactly do? |
@aanandr This seems to be unrelated to the pod subnet preview. I'm now getting this error on clusters that don't have the pod subnet preview enabled. |
@jabbera - the original issue was related to Pod subnet creation. Can you please describe the exact problem? |
@aanandr hi! I deployed a cluster with the pod subnet feature turned on. I ran into some small issues so I decided to delete my cluster. The cluster managed resource group is deleted but the cluster continues to stick around, cannot be deleted, and won't release my subnet from my vnet so I can reclaim my address space. |
@palma21 - can you look into this? |
@palma21 2106220040006618 for the ticket. The cluster finally got deleted last night but the subnet is still hung up: |
This feature going to GA is very important to the continued use of AKS for us. I would love to see an update on when we can expect this. |
@aanandr yes, I was referring to a separate subnet for pods and hosts in AzureCNI. Most of my clients with hybrid cloud scenarios could use that but many of them have a policy of not using any preview feature :( P.S. |
@aanandr yes I want to split my cluster across different vnet. This is relevant because I want to isolate some workloads, some should use non routable ip space and some should have access to routable access to other vnets. |
Thanks @DavidZisky - we are working on a few key features that are required before this can go GA. As of now it is looking like we will GA in late Q1 of CY22. |
@denniszielke - this seems to be about spreading a single cluster (viz cluster nodes) across multiple VNets and running Pods that use a combination of non-VNet IPs and VNet IPs (maybe in separate node pools). |
Great, thanks for the estimate GA! As for your question - kubenet needs write permissions for the subnet/routing table. In highly regulated environments this is a problem because this means that a user who wants to create kubenet based AKS needs to have that write permission for the route tables (also roleassignments/write). AzureCNI doesn't require these permissions so it can be used when there is a requirement to give users as little permissions as possible. But then since AzureCNI assigns IP addresses to pods from Azure vnet this creates another problem because in hybrid environments the CIDRs are often assigned from some on-prem systems and they are small. So to answer your question ideal solution would be either 1) make it possible to deploy AKS with kubenet without the need for extra write permissions or 2) make something to AzureCNI so it doesn't assign IP addresses from vnet to each pod. This would mean either make it optionally work as kubenet so NAT pod IPs or the current solution of assigning separate subnet for hosts and pods also solves the problem in theory (because then I can assign the "official" CIDR that I get from on-prem system to nodes and create some separate Azure only subnet to pods). Hope I explained it well. Is it clear now? :D |
Hi @DavidZisky - this is clear. Thanks a lot for sharing your thoughts here. You are right about KubeNet (it skipped my mind). I had a few thoughts to share and some questions. Your feedback will enable us understand future requirements
|
So, first I'll answer the second question:
and then the first:
|
@DavidZisky What If we define the pod and worker subnets in their respective address spaces under the same vnet ? In that case it seems possible to have a 192.168.X.X subnet for workers but a 10.X.X.X subnet for PODs and only route/peer the worker one (or do I miss something) ? |
Hi @DavidZisky - sorry for the delayed response.
|
Update on GA timeline ? Also when will we see the windows support in the roadmap ? |
Hi @palma21 I'm also curious about any ETA. Thanks |
Is there any plan or timeline for supporting Windows worker nodes for this Dynamic IPs feature? |
@manali1st - yes it is planned. We are tentatively looking at the later part of the second half of this year. |
@aanandr Is the windows support delaying the GA status for Linux ? I've been waiting for months for this feature to go GA on my Linux only clusters. |
@kxs-jnadeau - no, Windows support doesnt impact Linux GA. We plan to GA Linux in a couple of months. |
I'm sorry if this has been answered somewhere in this thread but I could not find it. Does the PodSubnet feature allow for pods within the same cluster to have different subnets? For instance Pod A to be in a subnet different from Pod B? Both pods are in a different subnet from the cluster? I have a multitenant application where each pod is assigned to a tenant and some tenants might want private link or have their pod's vnet connected to their customer-owned vent. |
@phealy : Thanks for sharing update. |
@phealy can we move this to GA on the GitHub project please? |
Hello, what are the egress traffic requirements of the pod subnet ? Does the same egress traffic rules applies to pod subnet as mentioned here- https://docs.microsoft.com/en-us/azure/aks/limit-egress-traffic |
@BahriNipun - if your question was whether the egress rules in that link will all just work seamlessly with the new CNI then yes you are right - they will. If not then can you please clarify? |
Any ideas when dynamic IP allocation will be supported on Windows nodes? |
We are aiming to preview it within the next 6 months. |
For AKS clusters deployed with CNI dynamic IP allocation I can see Azure Front Door PLS not working correctly, any hints what the issue could be? |
https://learn.microsoft.com/en-us/azure/aks/configure-azure-cni-dynamic-ip-allocation#prerequisites PLS is explicitly noted here as not supported , however we are aware of the gap and working to support it soon. |
Support specifying different subnet for the pod CIDR address space, different than the node CIDR, and dynamic IP allocation.
https://docs.microsoft.com/en-us/azure/aks/configure-azure-cni#dynamic-allocation-of-ips-and-enhanced-subnet-support-preview
The text was updated successfully, but these errors were encountered: