-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Enhancing NodeIPAM to support multiple ClusterCIDRs #2593
Comments
/sig network |
[sig-network 2021-06-10] Waiting for SIG Network to decide whether to do this as a built-in or a CRD. Tim wants to see if we can define the type here as a CRD and make the controller built-in first. If we can't figure this out in the next few weeks, we'll just try to make it a built-in. |
@rahulkjoshi - to target 1.23, you need PRR approved By Thursday - feel free to assign to me once you open a PR |
/milestone v1.23 |
/stage alpha |
Hi @rahulkjoshi! 1.23 Enhancements team here. Just checking in as we approach enhancements freeze at 11:59pm PST on Thursday 09/09. Here's where this enhancement currently stands:
I see there's an open PR that will complete those last 2 items, so once that merges we're all good to go! Thanks! |
Hi @rahulkjoshi, 1.23 Enhancements Shadow here 👋🏽 Looks like the merged KEP number doesn't match the enhancements issue #2593. It is currently pointing to the PR #. Could you please update that? |
@supriya-premkumar @salaxander please take a look and let me know if this PR needs any other changes. |
Thank you @rahulkjoshi. Looks like this enhancement is all set for the freeze party 🎉 |
Hi @rahulkjoshi👋🏽 1.23 Enhancements Shadow here I see that the linked PRs are merged. Are there any other associated PRs for this issue? Marking this issue as |
I think the code will not be merged before the 1.23 deadline. We'll probably merge into 1.24 |
@rahulkjoshi Are there any open PRs? If yes, Could you please link them in the description? |
To my knowledge, there aren't any open PRs. I'll switch this to be targeting alpha for 1.24 since it seems we're missing the deadline. |
Thank you @rahulkjoshi for confirming that this enhancement will target 1.24 |
The To have just one for both ipv4/ipv6 enforces a limit on the number of PODs on a node only based on the shortcomings of ipv4. It should be possible to define for instance "perNodeHostBits4: 7" and "perNodeHostBits6: 32" Some CNI-plugins, like Calico, already allows to configure ipv4 to some (not all) PODs on a node. My own kube-ipam can assign ipv4 addresses only to selected namespaces. I expect this feature, in some form, to be common practice in large cluster in the future. It is possible to assign large segments to ipv6-only nodes in a cluster, and have a mix of dual-stack and ipv6-only nodes with the current implementation, but that is not enough. |
For simplicity we made them the same, on the assumption that all pods have
the same set of families. If that is not true, then we should think about
decoupling and having per-family rules. Sigh.
…On Mon, Jul 10, 2023 at 6:22 AM Lars Ekman ***@***.***> wrote:
The perNodeHostBits should be per family.
To have *just one* for both ipv4/ipv6 enforces a limit on the number of
PODs on a node only based on the shortcomings of ipv4. It should be
possible to define for instance "perNodeHostBits4: 7" and
"perNodeHostBits6: 32"
Some CNI-plugins, like Calico, already allows to configure ipv4 to *some*
(not all) PODs on a node. My own kube-ipam
<https://github.com/Nordix/ipam-node-annotation#limit-ipv4-address-allocation>
can assign ipv4 addresses only to selected namespaces. I expect this
feature, in some form, to be common practice in large cluster in the future.
It is possible to assign large segments to ipv6-only nodes in a cluster,
and have a mix of dual-stack and ipv6-only nodes with the current
implementation, but that is not enough.
—
Reply to this email directly, view it on GitHub
<#2593 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/ABKWAVA4DINY6VYNGEZMCKLXPP62LANCNFSM42F55X2A>
.
You are receiving this because you were mentioned.Message ID:
***@***.***>
|
Are we still shooting for Beta in 29? |
There is concerns about moving this API inside the core group as it can cause confusion on users and the networking implementation already have their own mechanisms , see #4174 |
Hello @rahulkjoshi 👋, v1.29 Enhancements team here. Just checking in as we approach enhancements freeze on 01:00 UTC, Friday, 6th October, 2023. This enhancement is targeting for stage Here's where this enhancement currently stands:
For this KEP, we would just need to update the following:
The status of this enhancement is marked as |
I believe this should be removed from the milestone following #4253? |
Done
…On Fri, Sep 29, 2023 at 3:00 PM Benjamin Elder ***@***.***> wrote:
I believe this should be removed from the milestone following #4253
<#4253>?
—
Reply to this email directly, view it on GitHub
<#2593 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/ABKWAVFHFB56DIXNXR4ECBLX45AI3ANCNFSM42F55X2A>
.
You are receiving this because you were mentioned.Message ID:
***@***.***>
|
/close |
@aojea: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
This is now implemented out of tree https://github.com/kubernetes-sigs/node-ipam-controller |
Enhancement Description
ClusterCIDR
to be fetchable by pods. kubernetes#46508 (comment)k/enhancements
) update PR(s):k/k
) update PR(s):k/website
) update PR(s):k/enhancements
) update PR(s):k/k
) update PR(s):k/website
) update(s):Please keep this description up to date. This will help the Enhancement Team to track the evolution of the enhancement efficiently.
This KEP has been withdrawn #4253 , there is some remaining work on creating a new repo to host the existing code and removing it from tree
The text was updated successfully, but these errors were encountered: