-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unable to change cluster CIDR #93
Comments
+1 |
I'll improve the docs. To disable flannel you just need to pass |
works fine with canal:
I don't know if it's linked, but I have an error message on the agents:
|
Apparently I've an error with traefik too:
|
@ibuildthecloud Not the original reporter, but I happened to run into the same issue with conflict on 10.42.0.0 network.
The k3s server host is 10.42.0.10 (and two agents on 10.42.0.11 and 10.42.0.12 but they're not active at the moment) |
@ibuildthecloud I was able to use cilium as CNI with v0.2.0-rc5, running server with |
well, turns out there was an option, but not initialized, same story as with cluster-cidr: |
As far as my crash is concerned, it appears that it does not like for cidr-cluster to be changed if k3s server has been run at least once. It does work when set on a fresh, never run config. |
Works for me now! Although I was not able to add a agent node yet (but this my be due to another issue like firewalling) |
Changing my CIDR to support ipv6 results in a panic to it crashes completely and it logs: Creating the node lease for IPv4. This is the n.Spec.PodCIDRs: [10.42.0.0/24] instead of Creating the node lease for IPv4. This is the n.Spec.PodCIDRs: [10.42.0.0/24 fc00:a0::/64] How can we enable ipv6 on an existing cluster? |
You cannot change the CIDRs or add a new address family to an existing cluster. Cluster networking should be established when the cluster is initially started. |
So there is no way to ever enable ipv6 without losing ALL pods and data? WOW :( |
I just had the same issue. I'd like to suggest that, if you define a |
When using k3s server it uses 10.42.0.0/16 as cluster cidr by default. This clashes with our network setup. So I tried to change this by giving a
--cluster-cidr 10.10.0.0/16
parameter (as indicated byk3s help
). Still, the startup output tells me that k3s is ignoring the parameter:To Reproduce
k3s server --cluster-cidr 10.10.0.0/16
Expected behavior
When calling kube-controller-manager
--cluster-cidr
parameter should be passed the value given with the call to k3sThe text was updated successfully, but these errors were encountered: