-
Notifications
You must be signed in to change notification settings - Fork 524
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use systemd-networkd
for aws-ecs-2
and k8s 1.28 variants
#3394
Conversation
4e4f497
to
c6de460
Compare
^ Removes the |
This commit adds the appropriate build flag to use systemd-networkd as the network backend for these variants.
c6de460
to
0b13357
Compare
^ Rebase onto |
This commit adds the appropriate build flag to use systemd-networkd as the network backend for these variants.
This commit adds the appropriate build flag to use systemd-networkd as the network backend for these variants.
0b13357
to
f8c45fc
Compare
^ Flips |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Built aws-k8s-1.28
x86_64 AMIs and deployed to a 1.27 EKS cluster.
Installed cilium 1.14.1 via helm:
helm install cilium cilium/cilium --version 1.14.1 \
--namespace kube-system \
--set eni.enabled=true \
--set ipam.mode=eni \
--set egressMasqueradeInterfaces=eth0 \
--set tunnel=disabled \
--set nodeinit.enabled=false
Verified pods were all happy:
$ kubectl get pods -n kube-system
NAME READY STATUS RESTARTS AGE
cilium-4d5gn 1/1 Running 0 7m36s
cilium-hwxhr 1/1 Running 0 7m37s
cilium-l7xz6 1/1 Running 0 7m37s
cilium-operator-66d75c5db6-hldz9 1/1 Running 0 4m27s
cilium-operator-66d75c5db6-vbshr 1/1 Running 0 4m48s
cilium-qz9bh 1/1 Running 0 7m36s
coredns-647484dc8b-jvnk9 1/1 Running 0 4m7s
coredns-647484dc8b-mwx7r 1/1 Running 0 4m7s
kube-proxy-jgh7f 1/1 Running 0 7m37s
kube-proxy-m2kjq 1/1 Running 0 7m37s
kube-proxy-sr9fq 1/1 Running 0 7m36s
kube-proxy-zlfzc 1/1 Running 0 7m36s
And checked cilium status:
$ cilium status
/¯¯\
/¯¯\__/¯¯\ Cilium: OK
\__/¯¯\__/ Operator: OK
/¯¯\__/¯¯\ Hubble Relay: disabled
\__/¯¯\__/ ClusterMesh: disabled
\__/
Deployment cilium-operator Desired: 2, Ready: 2/2, Available: 2/2
DaemonSet cilium Desired: 4, Ready: 4/4, Available: 4/4
Containers: cilium Running: 4
cilium-operator Running: 2
Cluster Pods: 6/6 managed by Cilium
Image versions cilium quay.io/cilium/cilium:v1.14.1@sha256:edc1d05ea1365c4a8f6ac6982247d5c145181704894bb698619c3827b6963a72: 4
cilium-operator quay.io/cilium/operator-aws:v1.14.1@sha256:ff57964aefd903456745e53a4697a4f6a026d8fffdb06f53f624a23d23ade37a: 2
Ran connectivity tests:
$ cilium connectivity test
...
✅ All 32 tests (250 actions) successful, 0 tests skipped, 1 scenarios skipped.
Everything looks good!
We are using the BottlerRocket AWS-ECS-2 variant. And it fails to detect other ENIs that has been attached. Anyway to solve this? |
Hello @heri16, can you cut a new issue for this? The networkd work has been complete for a while and should be attaching ENIs. Cutting a separate issue would let us dive in just on the issue you are facing! |
Issue number:
Related to #2449
Description of changes:
Draft while testing is in progress
This PR moves the
aws-ecs-2
, Kubernetes 1.28, and*-dev
variants tosystemd-networkd
as the network backend.Testing done:
WIP - will update as testing is completed
aws-k8s-1.28
conformance testing in IPv6-only clusteraws-k8s-1.28
conformance testing in IPv4 clustermetal-k8s-1.28
conformance testingvmware-k8s-1.28
conformance testingaws-ecs-2
internal ECS testingGlobal
viaresolvectl
.)optional
via network config. EnsureRequiredForOnline=false
optional
via network configwicked
variants across various platformsTerms of contribution:
By submitting this pull request, I agree that this contribution is dual-licensed under the terms of both the Apache License, version 2.0, and the MIT license.