-
Notifications
You must be signed in to change notification settings - Fork 64
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: Support for Azure CNI without overlay & BYO CNI #365
feat: Support for Azure CNI without overlay & BYO CNI #365
Conversation
…or non azure cni overlay setups
…ed constants in the project
…on of propagating kubelet configuration this way
…rlay configuration
… know have two tests checking cluster state
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/test
…gian/aks-karpenter into bsoghigian/azurecni-v1-clean
After adding the NETWORK-POLICY variable, Karpenter should be able to be used in underlay network and Azure Cni AKS |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good, mosly minor things
…s inside a helper function, ginkgo will skip the helper when analyzing the stack trace to identify where the failure occurred. this is a simpler mechanism to passing in a skip offset when calling fail see: https://pkg.go.dev/github.com/onsi/ginkgo/v2\#GinkgoHelper
…ss settings validation for network plugin none
c93aee7
to
4ac3ec4
Compare
thank you for fixing this folks! hope a new release is cut soon. we cant wait to use this on our AKS cluster. |
Fixes #367
Description
This PR adds support for azure cni without overlay, as well as introduces some makefile goodness for creating clusters or other cni configurations.
Why Do We Need Secondary IP Configs For AZ CNI Without Overlay?
When a pod is created, the Azure CNI plugin allocates an IP address from the pool of secondary IP addresses configured on the NIC of the node where the pod is scheduled. The Azure CNI plugin manages the allocation and de-allocation of these IP addresses through the IP Address Manager (IPAM), ensuring each pod receives a unique IP address and tracking the usage of these addresses.
In this setup, pods are assigned IP addresses from the node's subnet, allowing for direct IP connectivity. This enables pods within the same virtual network to communicate without the need for Network Address Translation (NAT). The node's NIC routes traffic to the appropriate pod based on the assigned IP.
Flow
veth
pair interfaces that are added to the host network.Learn more about specifics here
How was this change tested?
What this PR does not include
Does this change impact docs?
Release Note