Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Consider switching default CNI to Calico #1880

Closed
sandys opened this issue Jun 9, 2020 · 12 comments
Closed

Consider switching default CNI to Calico #1880

sandys opened this issue Jun 9, 2020 · 12 comments

Comments

@sandys
Copy link

sandys commented Jun 9, 2020

hi ,
so we have begun using k3s in production. We have had intermittent issues with flannel - especially with spot instances coming up and going down. we have also seen this issue - flannel-io/flannel#1245

What is most worrying is that flannel seems to be effectively unmaintained. There also seems to be compatibility issues with k8s 1.17.2

Calico is one of the only plugins supported by AWS ( https://docs.aws.amazon.com/eks/latest/userguide/alternate-cni-plugins.html) , AKS ( https://docs.microsoft.com/en-us/azure/aks/use-network-policies#network-policy-options-in-aks ) and GKE ( https://cloud.google.com/kubernetes-engine/docs/concepts/network-overview )

Calico is also part of CNCF - https://landscape.cncf.io/selected=project-calico with an Apache 2.0 license.

Wanted to open a placeholder issue for any consideration to choose calico as default

@blaggacao
Copy link

blaggacao commented Sep 23, 2020

calico can advertise BGP routes and thereby — given appropriate router hardware — effectively implement bare metal external lbs without the need for metalLB, iirc.

@ghost
Copy link

ghost commented Dec 14, 2020

Wireguard support for Calico was announced four days before this was opened — positive. But if other CNIs can already be swapped in what's the advantage of changing the default when it would take away time from adding support other CNIs such as Cilium? I see 21 thumbs up for the default adjustment but no attention from maintainers on this issue—which seems a bit strange. Are 90% of users switching the default? Or is this more of a nice-to-have consideration issue?

See also:

@sandys
Copy link
Author

sandys commented Mar 8, 2021

Calico can now announce service lb ip addresses to BGP. Wireguard support is stable. https://docs.projectcalico.org/archive/v3.18/networking/advertise-service-ips#advertise-service-load-balancer-ip-addresses

@billimek
Copy link

billimek commented Apr 1, 2021

It would be a really great user experience if we could at least choose Calico as the CNI as part of the k3s bootstrapping/installation instead of needing to install it out-of-band.

Do any of the k3s maintainers have insights if this is even a possibility in the future, or should we continue to use workarounds like we do today?

@brandond
Copy link
Member

brandond commented Apr 1, 2021

We don't currently bundle 'alternatives' for any of K3s' opinionated defaults. Disabling the packaged component and installing your own is not a workaround, it is the supported method to replace something that we've selected (usually for its simplicity and ease of use) with something better suited to your specific use case.

At some point we may wholesale change out components, but we don't currently have that on the roadmap.

@stale
Copy link

stale bot commented Sep 28, 2021

This repository uses a bot to automatically label issues which have not had any activity (commit/comment/label) for 180 days. This helps us manage the community issues better. If the issue is still relevant, please add a comment to the issue so the bot can remove the label and we know it is still valid. If it is no longer relevant (or possibly fixed in the latest release), the bot will automatically close the issue in 14 days. Thank you for your contributions.

@stale stale bot added the status/stale label Sep 28, 2021
@Bessonov
Copy link

activity

@stale stale bot removed the status/stale label Sep 28, 2021
@stale
Copy link

stale bot commented Mar 27, 2022

This repository uses a bot to automatically label issues which have not had any activity (commit/comment/label) for 180 days. This helps us manage the community issues better. If the issue is still relevant, please add a comment to the issue so the bot can remove the label and we know it is still valid. If it is no longer relevant (or possibly fixed in the latest release), the bot will automatically close the issue in 14 days. Thank you for your contributions.

@stale stale bot added the status/stale label Mar 27, 2022
@Bessonov
Copy link

activity

@stale stale bot removed the status/stale label Mar 28, 2022
@stale
Copy link

stale bot commented Sep 24, 2022

This repository uses a bot to automatically label issues which have not had any activity (commit/comment/label) for 180 days. This helps us manage the community issues better. If the issue is still relevant, please add a comment to the issue so the bot can remove the label and we know it is still valid. If it is no longer relevant (or possibly fixed in the latest release), the bot will automatically close the issue in 14 days. Thank you for your contributions.

@stale stale bot added the status/stale label Sep 24, 2022
@Bessonov
Copy link

activity

@stale stale bot removed the status/stale label Sep 24, 2022
@cwayne18
Copy link
Member

At this point we do not plan to change the default CNI any time soon. You should be able to disable flannel and use other CNIs, but k3s by design is opinionated. I'm going to close this out for now.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

6 participants