Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Can't use calico on windows on EKS due to forced network mode #3165

Closed
davidgiga1993 opened this issue Feb 13, 2024 · 1 comment · Fixed by #3166
Closed

Can't use calico on windows on EKS due to forced network mode #3165

davidgiga1993 opened this issue Feb 13, 2024 · 1 comment · Fixed by #3166

Comments

@davidgiga1993
Copy link
Contributor

davidgiga1993 commented Feb 13, 2024

We're running a EKS cluster but are not using the amazon vpc cni, but rather plain calico vxlan which works great.

However when using windows nodes the operator forces the daemonset KUBE_NETWORK to *.vpc as it uses the auto-detected k8s provider rather than the cni.type configuration that is also used for the linux installation

On linux this works as it uses the cni.type config parameter

Expected Behavior

The windows installation should also follow the cni.type configuration

Current Behavior

The kubernetes network on windows gets forced to the default CNI for the auto-detected k8s provider

Possible Solution

Change the parameter to evaluate the cni.type config instead.
We build a custom fork which implemented this change and it worked fine in our environment.

Steps to Reproduce (for bugs)

  1. Install on EKS using the following config:
spec:
  variant: "Calico"
  kubernetesProvider: EKS
  cni:
    type: Calico
  1. Run a windows node
  2. The KUBERNETES_NETWORK is set to vpc.* rather than calico.*
@davidgiga1993 davidgiga1993 changed the title Can't user calico on windows on EKS due to forced network mode Can't use calico on windows on EKS due to forced network mode Feb 13, 2024
@tmjd
Copy link
Member

tmjd commented Feb 13, 2024

@coutinhop you added the windows support so I think this is something you should take a look at.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants