Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[EKS] [CNI]: Optional Default CNI Plugin Installation #71

Closed
TigerC10 opened this issue Dec 17, 2018 · 11 comments
Closed

[EKS] [CNI]: Optional Default CNI Plugin Installation #71

TigerC10 opened this issue Dec 17, 2018 · 11 comments
Labels
EKS Amazon Elastic Kubernetes Service Proposed Community submitted issue

Comments

@TigerC10
Copy link

TigerC10 commented Dec 17, 2018

Tell us about your request
I would like an option to disable default installation of the AWS VPC CNI Plugin during create cluster.

Which service(s) is this request for?
EKS

Tell us about the problem you're trying to solve. What are you trying to do, and why is it hard?
When an EKS cluster is created, the AWS VPC CNI Plugin is automatically installed to the cluster as the default CNI plugin. In order to change the plugin, the AWS VPC CNI plugin must be uninstalled before worker nodes join the cluster, or else all existing worker nodes must be destroyed after removing the default and installing a different CNI plugin.

Alternatively, a custom AMI must be supplied to the worker nodes which use a lower CNI plugin prefix than 10 so that the worker node loads it before loading the AWS VPC CNI Plugin.

In either of these cases, clusters become less "deployable" with automated tooling. In one case there are manual steps involved in the deployment of a cluster (and possibly a race condition), and in the other case a custom AMI is required which could become out-dated over time as Amazon releases new AMI base images.

Are you currently working around this issue?
Currently building a custom AMI with an alternate CNI plugin installed with 00- prefix.

Additional context
awslabs/amazon-eks-ami#117
aws/amazon-vpc-cni-k8s#214
aws/amazon-vpc-cni-k8s#176

@TigerC10 TigerC10 added the Proposed Community submitted issue label Dec 17, 2018
@mogren mogren added the EKS Amazon Elastic Kubernetes Service label Jan 11, 2019
@gaurav-dalvi
Copy link

looks like this might be working for some people : awslabs/amazon-eks-ami#117

@TigerC10
Copy link
Author

@gaurav-dalvi did the workaround work for you? It didn’t work for me.

@gaurav-dalvi
Copy link

yeah same here. did not work for me either.

@lgg42
Copy link

lgg42 commented Feb 16, 2019

Any updates on this? Just wondering... it really sucks having to hack some stuff just to opt out...

@lgg42
Copy link

lgg42 commented Feb 18, 2019

Damn, I really think this should be top priority. In forums, chats, slacks, IRCs, telegram groups, whatever, you name it... there are so many people/companies not choosing EKS because of the pod LIMIT. This simply erases the whole point of kubernetes.

Also... have any of you tried CNI-Genie?? : https://github.com/Huawei-PaaS/CNI-Genie

@TigerC10
Copy link
Author

TigerC10 commented Feb 19, 2019

Yeah, I'm using cni-genie at the moment. if you install it to the master node and configure the default to a different CNI before you create the ec2 worker nodes, it works like a charm. However, automating this is kinda difficult.

@lgg42
Copy link

lgg42 commented Feb 19, 2019

W-O-W, even if automating it is a PITA, knowing that it works with EKS is something great to hear! so many thanks!

@TigerC10
Copy link
Author

I mean.... yeah... it works. I'd still rather not have to stop my cloudformation scripts to run a few kubectl commands before continuing them to create the worker nodes.

@jwenz723
Copy link

Would love to see some movement on this issue so that I can use a CNI other than AWS VPC CNI.

@agung-kargo
Copy link

Yeah, I'm using cni-genie at the moment. if you install it to the master node and configure the default to a different CNI before you create the ec2 worker nodes, it works like a charm. However, automating this is kinda difficult.

@TigerC10 do you have any article that describes the process? I would love to try this out.

@mikestef9
Copy link
Contributor

Closing as duplicate of #923 which we are working on

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
EKS Amazon Elastic Kubernetes Service Proposed Community submitted issue
Projects
None yet
Development

No branches or pull requests

7 participants