-
-
Notifications
You must be signed in to change notification settings - Fork 464
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Docs] Calico fails to start in latest k3s versions #1375
Comments
Further testing revealed this started to happen with k8s |
Fixes #11567 The trick is to run the test under k8s `v1.27.6-k3s1` as the following versions break Calico in k3s (see k3d-io/k3d#1375). Also removed the `continue-on-error: true` directive in the integration workflow because it was hiding this problem.
Hi @alpeb , thanks for opening this issue and following up! |
Fixes #11567 The trick is to run the test under k8s `v1.27.6-k3s1` as the following versions break Calico in k3s (see k3d-io/k3d#1375). Also removed the `continue-on-error: true` directive in the integration workflow because it was hiding this problem.
* Reenable cni-calico-deep integration test Fixes #11567 The trick is to run the test under k8s `v1.27.6-k3s1` as the following versions break Calico in k3s (see k3d-io/k3d#1375). Also removed the `continue-on-error: true` directive in the integration workflow because it was hiding this problem.
Fixes linkerd/linkerd2#11597 When the cni plugin is triggered, it validates that the proxy has been injected into the pod before setting up the iptables rules. It does so by looking for the "linkerd-proxy" container. However, when the proxy is injected as a native sidecar, it gets added as an _init_ container, so it was being disregarded here. We don't have integration tests for validating native sidecars when using linkerd-cni because [Calico doesn't work in k3s since k8s 1.27](k3d-io/k3d#1375), and we require k8s 1.29 for using native sidecars. I did nevertheless successfully test this fix in an AKS cluster.
Fixes linkerd/linkerd2#11597 When the cni plugin is triggered, it validates that the proxy has been injected into the pod before setting up the iptables rules. It does so by looking for the "linkerd-proxy" container. However, when the proxy is injected as a native sidecar, it gets added as an _init_ container, so it was being disregarded here. We don't have integration tests for validating native sidecars when using linkerd-cni because [Calico doesn't work in k3s since k8s 1.27](k3d-io/k3d#1375), and we require k8s 1.29 for using native sidecars. I did nevertheless successfully test this fix in an AKS cluster.
@iwilltry42 for native nftable support you must run Calico v3.29+ or set felix backend to nftable. |
What did you do
I applied the calico manifests as instructed in the k3d docs:
What did you expect to happen
The calico workloads to come up fine.
Screenshots or terminal output
Instead, after about a minute the
calico-node
pod starts failing. Its log is filled with these entries repeated:Which OS & Architecture
$ k3d runtime-info arch: x86_64 cgroupdriver: systemd cgroupversion: "2" endpoint: /var/run/docker.sock filesystem: extfs infoname: riemann name: docker os: NixOS 23.05 (Stoat) ostype: linux version: 24.0.5
Which version of
k3d
Which version of docker
The text was updated successfully, but these errors were encountered: