-
Notifications
You must be signed in to change notification settings - Fork 2.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Flannel using new CNI API to support Discontiguous Cluster CIDR #6443
Comments
I tested some functionality but I'm going to wait until Monday to close this after conferring more with engineering. healthy cluster three server nodes $ kg cc -A
$ get_figs
$ vim newcc.yaml
$ k apply -f newcc.yaml
$ k cluster-info dump | grep -i podcidr
$ k cluster-info dump | grep -i multi-cluster-cidr
$ cat invalidcidrcollision.yaml
$ cat targetanodename.yaml
$ kgn -o wide
$ kgp -A -o wide
$ kg cc -A
|
Why are you adding CIDRs with collisions? You should check the logs probably the new CIDRs are not added to the allocator because collide; that's why |
I want to understand what happens when we test good behavior as well as bad behavior, that's why I've intentionally added CIDR collisions. |
This is enabling upstream functionality; I don't think we're on the hook to fix it if we don't like how it behaves when misconfigured. |
$ kg cc -A
$ kd cc/okay-cidr
To my contemporaries the steps are as follows From a server node not the one targeted by the cidr NodeSelector From the targeted node Traefik pods for example $ kgp -n kube-system -o wide | grep -i svclb
|
Is your feature request related to a problem? Please describe.
From 1.26 K8s supports discontinuous CIDR for the pod https://github.com/kubernetes/enhancements/tree/master/keps/sig-network/2593-multiple-cluster-cidrs
On Flannel there is a WIP to support this feature flannel-io/flannel#1658
Describe the solution you'd like
Enable the same feature on K3s
Describe alternatives you've considered
Additional context
The text was updated successfully, but these errors were encountered: