You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Expected:
When deploying the aws network policy controller into a cluster with no existing policy endpoints and the enable-network-policy-controller in aws-vpc-cni configmap set to false, the controller would be disabled and not start creating new policy endpoints.
Observed:
When deploying the aws network policy controller into a cluster with no existing policy endpoints and the enable-network-policy-controller in aws-vpc-cni configmap set to false, the controller is enabled and immediately starts creating policy endpoints based on network policies deployed on the cluster.
Expected:
When deploying the aws network policy controller into a cluster with no existing policy endpoints and the
enable-network-policy-controller
inaws-vpc-cni
configmap set tofalse
, the controller would be disabled and not start creating new policy endpoints.Observed:
When deploying the aws network policy controller into a cluster with no existing policy endpoints and the
enable-network-policy-controller
inaws-vpc-cni
configmap set tofalse
, the controller is enabled and immediately starts creating policy endpoints based on network policies deployed on the cluster.Details:
Kubernetes provider: EKS
Kubernetes version: 1.28
network policy controller image tag: v1.0.2
amazon-k8s-cni: v1.15.4-eksbuild.1
Calico currently running as network security policy engine
aws-vpc-cni configmap:
Controller Logs:
The text was updated successfully, but these errors were encountered: