-
Notifications
You must be signed in to change notification settings - Fork 93
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
agent-protocol-forwarder failing to bootstrap because of routes conflicting #1909
Comments
Based on current code my suspect is that when creating the interface, kernel will bring routes by default, and the agent is trying to create again. Maybe we should check if the routes are there before creating? Or maybe I'm still missing something. |
@beraldoleal could you get additional network info in the worker node? If you can identify the network namespace for the pod in worker node side, please post the output of In my environment, a network namespace of a pod is shown as follows.
Alternatively, you can create a usual runc pod, and execute I guess, the GKE CNI manipulates routes automatically set by kernel. |
Since the pod is still in ContainerCreating, I could not get the ns. Here are all namespace details: https://paste.centos.org/view/3cf115da And the detailed address and routes for the pod:
|
The GKE CNI plugin is something similar to the PTP CNI plugin, which deletes a route that is automatically set by kernel as follows.
So, we need to delete a route that is set by kernel in the peer-pod side as well. I will think of how to fix it. |
CNI plugins like PTP and GKE remove a route that is automatically added by kernel for eth0, and then add another route for the same destination. This patch changes the code to manipulates routes to support such CNI plugins. Fixes confidential-containers#1909 Signed-off-by: Yohei Ueda <[email protected]>
CNI plugins like PTP and GKE remove a route that is automatically added by kernel for eth0, and then add another route for the same destination. This patch changes the code to manipulates routes to support such CNI plugins. Fixes confidential-containers#1909 Signed-off-by: Yohei Ueda <[email protected]>
CNI plugins like PTP and GKE remove a route that is automatically added by kernel for eth0, and then add another route for the same destination. This patch changes the code to manipulates routes to support such CNI plugins. Fixes confidential-containers#1909 Signed-off-by: Yohei Ueda <[email protected]>
CNI plugins like PTP and GKE remove a route that is automatically added by kernel for eth0, and then add another route for the same destination. This patch changes the code to manipulates routes to support such CNI plugins. Fixes confidential-containers#1909 Signed-off-by: Yohei Ueda <[email protected]>
CNI plugins like PTP and GKE remove a route that is automatically added by kernel for eth0, and then add another route for the same destination. This patch changes the code to manipulates routes to support such CNI plugins. Fixes confidential-containers#1909 Signed-off-by: Yohei Ueda <[email protected]>
This is basically Cfir's work with some modifications to support the repository layout and small fixes. Rigth now, GKE is not supported because confidential-containers#1909, so this initial implementation requires a k8s cluster (either local or at Google Compute Engine). Signed-off-by: Cfir Cohen <[email protected]> Signed-off-by: Beraldo Leal <[email protected]>
This is basically Cfir's work with some modifications to support the repository layout and small fixes. Rigth now, GKE is not supported because confidential-containers#1909, so this initial implementation requires a k8s cluster (either local or at Google Compute Engine). Signed-off-by: Cfir Cohen <[email protected]> Signed-off-by: Beraldo Leal <[email protected]>
This is basically Cfir's work with some modifications to support the repository layout and small fixes. Rigth now, GKE is not supported because confidential-containers#1909, so this initial implementation requires a k8s cluster (either local or at Google Compute Engine). Signed-off-by: Cfir Cohen <[email protected]> Signed-off-by: Beraldo Leal <[email protected]>
This is basically Cfir's work with some modifications to support the repository layout and small fixes. Rigth now, GKE is not supported because confidential-containers#1909, so this initial implementation requires a k8s cluster (either local or at Google Compute Engine). Signed-off-by: Cfir Cohen <[email protected]> Signed-off-by: Beraldo Leal <[email protected]>
CNI plugins like PTP and GKE remove a route that is automatically added by kernel for eth0, and then add another route for the same destination. This patch changes the code to manipulates routes to support such CNI plugins. Fixes confidential-containers#1909 Signed-off-by: Yohei Ueda <[email protected]>
This is basically Cfir's work with some modifications to support the repository layout and small fixes. Rigth now, GKE is not supported because confidential-containers#1909, so this initial implementation requires a k8s cluster (either local or at Google Compute Engine). Signed-off-by: Cfir Cohen <[email protected]> Signed-off-by: Beraldo Leal <[email protected]>
I'm provisioning a new provider (GCP/GKE) and for some reason on the PodVM the agent-protocol-forwarder is having some issues to bootstrap.
After realizing the forwarder was not starting due to vxlan conflicts, I deleted the vxlan manually and executed the following tests:
Here is the network on the PodVM before:
Note that there is no vxlan interface and no routes at this point. Then I start the agent-protocol-forwarder:
It is actually complaining the route already exists, but wait, there was no route before on the podns, but If check now:
GKE network is currently a "default" VPC with one subnet for each region (also called "default"). Both VMs and GKE nodes are using this default VPC. What I tried so far:
Here is also the
daemon.json
:And detailed interfaces for both PodVM and podns:
Full agent-protocol-forwarder log:
https://paste.centos.org/view/4cc600f9
The text was updated successfully, but these errors were encountered: