This repository has been archived by the owner on Sep 30, 2020. It is now read-only.
feat: initial support for amazon-vpc-cni-k8s #1463
Merged
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Add the below configuration to your
cluster.yaml
and thenamazon-vpc-cni-k8s
is installed as a daemonset for assigning VPC private IP addresses to your K8S pods.Controller nodes have a k8s manifest file for installing amazon-vpc-cni-k8s daemonset. It adds an init container to copy all the cni binaries bundled to the hyperkube image. Otherwise amazon-vpc-cni-k8s doesn't work due to missing the
loopback
cni bin.kubelet on worker and controller nodes now have appropriate
--node-ip
and--max-pods
settings to make amazon-vpc-cni-k8s reliably work.This is one of prerequisites towards the EKS support.
TODOs:
--max-pods
should be set to an appropriately computed value as per https://github.com/aws/amazon-vpc-cni-k8s#setup--cni-conf-dir=/etc/cni/net.d
by defaut. kube-aws uses/etc/kubernets/cni/net.d
so amazon-vpc-cni-k8s should be configured accordingly.ref #1434