-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AKS: NetworkProfile / Advanced Networking #1479
AKS: NetworkProfile / Advanced Networking #1479
Conversation
….com/lfshr/terraform-provider-azurerm into containerservices-advancednetworking
@tombuildsstuff I couldn't get the tests running properly (wouldn't fail when it should have), may need some assistance here. Also think I should merge the two tests into one. This is just the resource. If you want me to include the data source here, let me know. Otherwise I'll open up another PR for it. 😄 Also.. Check my networking. Not one of my strong points! 😛 |
2c0eb20
to
48cff90
Compare
….com/lfshr/terraform-provider-azurerm into containerservices-advancednetworking
@tombuildsstuff the resource and data source is good to review. Just about to add an example into the examples. Be harsh! 👍 |
Result from pinging node agent from another vm within the same vnet:
Nothing more satisfying 😄 |
This comment has been minimized.
This comment has been minimized.
@tombuildsstuff did you look at my above comments? The error you're receiving on the serviceCidr is a non-descriptive error. See Azure/AKS#506 |
@lfshr I read the first two links but missed the third, apologies. I'd suggest we reply within those specific issues to work around the lack of threading here?
🤦♂️ good spot - I'll re-test that now |
The ip fields are now Computed too
… the network_profile blocks specified Example: ``` Error: Error running plan: 1 error(s) occurred: * azurerm_kubernetes_cluster.test: 1 error(s) occurred: * azurerm_kubernetes_cluster.test: If a `network_profile` block is specified, the Agent Pools must be attached to a Subnet ```
…and `service_cidr` fields.
@lfshr cool, so I can confirm setting that works. Given I've made those changes locally, I'm going to commit them (and then also add a couple more for acceptance tests for both the Azure network profile & the Kubenet network profile; and some validation to work around Azure/AKS#506) - so that we can run the tests and ship this (I hope you don't mind!) @metacpp thanks for the heads up :) |
8e8f39e
to
ff3e206
Compare
@tombuildsstuff not at all. Do what you need to do. Anything you need from my end? |
@lfshr @tombuildsstuff You can see all my changes on top of @lfshr 's branch:
It's just a reference. :-) |
@lfshr nope, all good - the tests pass :) Thanks again for this PR - apologies for the confusion here. |
@tombuildsstuff what're the conclusions here? |
Do we know when is 1.12 expected? |
@giggio we don't give exact dates since things can change - but I have a feeling it'll probably be next week at this point. |
This PR aims to add Calico Network policy to AKS as described in [MS Docs](https://docs.microsoft.com/en-us/azure/aks/use-network-policies). Added `network_policy` to `kubernetes_cluster` resource. PR Inspiration: #1479
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. If you feel I made an error 🤖 🙉 , please reach out to my human friends 👉 [email protected]. Thanks! |
Added
network_profile
tokubernetes_cluster
resource.#1389 #1434