-
Notifications
You must be signed in to change notification settings - Fork 25
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support separate subnets for LBs and workers #827
Conversation
Signed-off-by: Mikkel Oscar Lyderik Larsen <[email protected]>
a17482f
to
11a2828
Compare
Signed-off-by: Mikkel Oscar Lyderik Larsen <[email protected]>
Signed-off-by: Mikkel Oscar Lyderik Larsen <[email protected]>
subnetsValueKey: azInfoWorkers.SubnetsByAZ(), | ||
availabilityZonesValueKey: azInfoWorkers.AvailabilityZones(), | ||
subnetIPV6CIDRsKey: strings.Join(azInfoWorkers.SubnetIPv6CIDRs(), ","), | ||
"lb_subnets": azInfoLBs.SubnetsByAZ(), |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is new, do we need in a similar change in provisionNodePool ?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I guess this is handled by azInfo: azInfoWorkers
change.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This will be used like this: zalando-incubator/kubernetes-on-aws#8440
👍 |
Signed-off-by: Mikkel Oscar Lyderik Larsen <[email protected]>
👍 |
This change require that we set I have tested what happens if we should have forgotten to set the tags in an existing cluster. The CF stack fails with: And rolls back without disruption. So there is no impact if it should be the case. |
👍 |
Add support for choosing different subnets for running Load Balancers and nodes. Until now they all used the same subnets leading to challenges when wanting to use different ingress and egress rules.
The subnets are selected based on tags:
kubernetes.io/role/elb
kubernetes.io/role/node
For safe roll out, we will first add the
kubernetes.io/role/node
tag to existing subnets with the tag:kubernetes.io/role/elb
such that there is no change for running clusters as a change will require a migration.