-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Initial encrypted network support #719
Initial encrypted network support #719
Conversation
89d19e3
to
9474b30
Compare
e26c5d9
to
a4039ea
Compare
79c089d
to
52a64ab
Compare
why did you enable hairpin mode in this change? |
Hairpin mode was enabled because it is a feature that people have asked for, and it is tested as part of the networking kubernetes-perf-test suite. If there is a good reason to disable it please let me know, as far as I could tell there was not much of a downside for turning it on. I have also been working on updating the networking tests (https://github.com/erikwilson/kubernetes-perf-tests/tree/master/network/benchmarks/netperf) to use the newest versions of the test utilities (iperf & netperf) and large MTUs. I will probably put in a separate PR with ansible scripts for network benchmarking based off https://github.com/erikwilson/rancher-k3s/tree/encrypted-network-testing/contrib/ansible. |
no, i don't have any reason to disable (or enable) it. |
lgtm |
@@ -421,20 +431,43 @@ func WritePasswords(passwdFile string, records [][]string) error { | |||
return os.Rename(passwdFile+".tmp", passwdFile) | |||
} | |||
|
|||
func genEncryptedNetworkInfo(controlConfig *config.Control, runtime *config.ControlRuntime) error { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
How can this be handled in HA mode? as far as I understand this function will result in creating a IPSECPSK for each master node
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
7ebec56
to
a6bb3c8
Compare
1748f95
to
6f7a1a7
Compare
This was only used to pass the bundled strongswan path through to the flannel ipsec backend, and is no longer needed. Ref: k3s-io#719 Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
This was only used to pass the bundled strongswan path through to the flannel ipsec backend, and is no longer needed. Ref: k3s-io#719 Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
This was only used to pass the bundled strongswan path through to the flannel ipsec backend, and is no longer needed. Ref: k3s-io#719 Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
This was only used to pass the bundled strongswan path through to the flannel ipsec backend, and is no longer needed. Ref: k3s-io#719 Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
This was only used to pass the bundled strongswan path through to the flannel ipsec backend, and is no longer needed. Ref: k3s-io#719 Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
This was only used to pass the bundled strongswan path through to the flannel ipsec backend, and is no longer needed. Ref: #719 Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
This was only used to pass the bundled strongswan path through to the flannel ipsec backend, and is no longer needed. Ref: #719 Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
This was only used to pass the bundled strongswan path through to the flannel ipsec backend, and is no longer needed. Ref: #719 Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
This was only used to pass the bundled strongswan path through to the flannel ipsec backend, and is no longer needed. Ref: #719 Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
This was only used to pass the bundled strongswan path through to the flannel ipsec backend, and is no longer needed. Ref: #719 Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
This was only used to pass the bundled strongswan path through to the flannel ipsec backend, and is no longer needed. Ref: k3s-io#719 Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
No description provided.