-
Notifications
You must be signed in to change notification settings - Fork 208
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Improvements for kube-proxy detection and replacement #1162
Conversation
053bb05
to
f007db2
Compare
f007db2
to
93d7c8c
Compare
@ksankeerth Thanks for the fix! Do you plan to add the k3s detection in a separate PR? |
I think we can use |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks
@ksankeerth It looks like this branch picked up a merge conflict. Could you please rebase on top of latest |
The current implementation tries to replace the kube-proxy for k3s and doesn't honor the value set for kube-proxy replacement by users. This PR fixes those issues. Fixes: cilium#1004 Signed-off-by: shankeerthan-kasilingam <[email protected]>
93d7c8c
to
57d80c8
Compare
Thanks for the review. Rebased. One CI checks seems to be failed. I'll look into it. |
Thanks. The failing CI check looks like a known flake. I've re-triggered the test to verify. |
Thanks for your contribution @ksankeerth! |
The current implementation tries to replace the kube-proxy for k3s and doesn't honor the value set for kube-proxy replacement by users. This PR fixes those issues.
Fixes: #1004
Signed-off-by: shankeerthan-kasilingam [email protected]