-
Notifications
You must be signed in to change notification settings - Fork 3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CFP: Update Cilium Helm install docs for EKS and the AWS VPC CNI #31041
Comments
Sounds like this would be quite helpful, next step would be creating a concerete PR proposal. |
Hi @caleb-devops , thanks for the tip but when I put this configuration prior to cilium install the coredns addon doesn't start. (Obviously because no CNI are found). |
Hi @Smana. CoreDNS requires that the CNI is deployed, so with the vpc-cni configuration values in place, Cilium will need to be installed before CoreDNS can run. The recommended node taint should prevent other pods (like coredns) from being scheduled on the node until Cilium is deployed. taints:
- key: "node.cilium.io/agent-not-ready"
value: "true"
effect: "NoExecute" |
Thx @caleb-devops , Actually I already have a toleration. However the cilium install only starts after the EKS module deployment is finished (including CoreDNS which is an EKS addon). |
@Smana you don't need to add the toleration to CoreDNS. Because CoreDNS relies on the CNI, it will need to be deployed after Cilium is installed. For the
|
This issue has been automatically marked as stale because it has not |
The AWS EKS team will be adding an option to initialize a bare EKS cluster (without any addons) through aws/containers-roadmap#923. After they do, it should no longer be necessary to patch the VPC CNI to disable it. |
EKS clusters can now be created without any addons: https://aws.amazon.com/about-aws/whats-new/2024/06/amazon-eks-cluster-creation-flexibility-networking-add-ons/ |
@caleb-devops may I know your eventual script to setup eks together with cilium in one go? |
@caleb-devops I am very interested in this too, I'm deploying a bare EKS cluster and there's some very strange order-of-eventing going on with coreDNS refusing to become healthy (and thus the nodes stall out in not ready state) |
Cilium Feature Proposal
Is your proposed feature related to a problem?
The documentation for installing CIlium in EKS with Helm currently recommends patching the VPC CNI with kubectl to enable Cilium to manage ENIs instead of the VPC CNI. While this does work, it adds a manual step that prevents bootstrapping a Cilium EKS cluster using Terraform or eksctl.
Describe the feature you'd like
Please update the docs to instead recommend using addon configuration values to patch the vpc-cni at the time it's deployed. Please note that
nodeSelector
is not a value that can be configured, so instead,affinity
must be used.The VPC CNI can be configured to not run on Cilium managed nodes using the following configuration values:
The text was updated successfully, but these errors were encountered: