-
Notifications
You must be signed in to change notification settings - Fork 218
Add flag to pass cluster CIDR to bootkube render #236
Comments
The |
@aaronlevy thanks for clarifying this. |
From an offline discussion I wanted to track some of the plans for this: The first step is going to be to change Initially this just means that The next step would be to update As a note, some of the other options discussed:
The issue with this approach is that it makes TLS bootstrapping difficult. The kubelet would start, then wait to be able to contact an api-server - but that api-server is a static pod waiting to be started by the kubelet. This would mean we would either need to do a 2 step process with the kubelet (let it start static pods, then kill it and let it start normally to do TLS bootstrap) - or mimic the TLS bootstrap functionality in bootkube itself. This seemed like a lot of new complexity which we don't need to immediately solve.
/cc @sym3try @Quentin-M |
This should be closed by: #318 |
This is awesome!! Thanks |
When I run bootkube to render assets, it assumes service-cluster-ip-range to be 10.3.0.0/24 and allocates etcd clusterIP and kube-dns clusterIP from that range. Make this as a parameter that can be passed to
bootkube render
.Why does kube-proxy daemonset need to pass
--cluster-cidr
tohyperkube proxy
image? Documentation says "It is used to bridge traffic coming from outside of the cluster". How does it work when using flanneld (its value is same as that set in etcd for /coreos.com/network/config Network value) and can this be made a parameter too so if not passed, it will not be set?The text was updated successfully, but these errors were encountered: