-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AKS : Advanced Networking / Calico Network Policy #2987
Conversation
Signed-off-by: thatInfrastructureGuy <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you for this PR! i've left some mostly minor comments inline but overall this is looking pretty good. Once those few issues are addressed and tests pass I think this should be good to merge 🙂
…essary. Removed check for calico in CustomizeDiff block. Signed-off-by: thatInfrastructureGuy <[email protected]>
6bd8597
to
6801100
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you for the changes, this LGTM now. However the tests are failing:
------- Stdout: -------
=== RUN TestAccAzureRMKubernetesCluster_advancedNetworkingAzureCalicoPolicy
=== PAUSE TestAccAzureRMKubernetesCluster_advancedNetworkingAzureCalicoPolicy
=== CONT TestAccAzureRMKubernetesCluster_advancedNetworkingAzureCalicoPolicy
--- FAIL: TestAccAzureRMKubernetesCluster_advancedNetworkingAzureCalicoPolicy (218.11s)
testing.go:538: Step 0 error: Error applying: 1 error occurred:
* azurerm_kubernetes_cluster.test: 1 error occurred:
* azurerm_kubernetes_cluster.test: Error creating/updating Managed Kubernetes Cluster "acctestaks190305190900741436" (Resource Group "acctestRG-190305190900741436"): containerservice.ManagedClustersClient#CreateOrUpdate: Failure sending request: StatusCode=400 -- Original Error: Code="BadRequest" Message="Parameter networkProfile.networkPolicy is not allowed."
Are there any steps we need to enable networkPolicy
on our subscription?
Also getting many of these:
* azurerm_virtual_network.test: 1 error occurred:
* azurerm_virtual_network.test: Error waiting for completion of Virtual Network "acctestvirtnet190305190900434025" (Resource Group "acctestRG-190305190900434025"): Code="InternalServerError" Message="An error occurred." Details=[]
@katbyte Thanks for reverting back. Yes. To enable network policy in your subscription please follow:
Source : https://docs.microsoft.com/en-us/azure/aks/use-network-policies#before-you-begin |
I believe this might be related to above comment as VNET creation is not getting completed because of "unknown parameter" networkProfile.networkPolicy. |
@katbyte Is there anything I can assist with? Can you please guide me for the documentation of labels. Eg: What does Thanks for helping me out! |
@katbyte , is there something more to change ? |
Hi guys, do you have any idea when this will be available for general release? We want to implement it at work. Thanks! |
Hey @katbyte it has been 15 days since your last activity on this issue. Could you please let us know if there is anything else left before merging this issue? |
Sorry for the delay here @dannydombrowski, @RichardFowles89, @jfcoz & @thatInfrastructureGuy our attention was elsewhere. I have verified that the tests now pass for us and this will get into |
That's great - thank you! I will keep my eye out. |
This has been released in version 1.24.0 of the provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. As an example: provider "azurerm" {
version = "~> 1.24.0"
}
# ... other configuration ... |
Great! Thank you for letting me know |
Has anyone had success with provisioning a network-policy enabled AKS cluster with the new provider? When attempting to provision an AKS cluster with this enabled, my deployment eventually fails with: The same state deploys fine without the network_policy enabled. Any assistance on this one or confirmation that it is working for others would be appreciated. |
@soggychipsnz I am running into same issue. I redeployed (not restarted) the VMs and did a terraform apply again to fix it. |
Thanks for confirming, I was wondering if I was missing something obvious. I have opened a case with MS to check out the failed instance as well just incase they have anything to add. |
Cheers for the feedback. I'll give that a go after I get closure from my case I have open with MS as they might be able to provide more understanding as to why this issue is happening. |
@soggychipsnz MicrosoftDocs/azure-docs#28567 Seems like azure backend issue which is currently being fixed. No ETA. |
Yep, this is bug for v1.12.x. versions below that are still working |
@thatInfrastructureGuy yep, both of those are working. it's up to users to decide which one is preferred. |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. If you feel I made an error 🤖 🙉 , please reach out to my human friends 👉 [email protected]. Thanks! |
This PR aims to add Calico Network policy to AKS as described in MS Docs.
Added
network_policy
tokubernetes_cluster
resource.PR Inspiration: #1479