-
-
Notifications
You must be signed in to change notification settings - Fork 329
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add ipv6 support #1075
Comments
Since I really need it, I will try to fix it then propose a change. I think to add terraform configuration so I don't need to use aws ssm command, but maybe someone else has a better idea |
I did something but I faced an unexpected issue: I can't find a way to configure the url ussed by the runner-manager to spawn runner instances. The gitlab runner is using the ipv4 endpoint ... Any ideas ? |
I have seen the pricing change as well, but I didn't know that SSM does not support IPv6 at all. Nice hint. I just checked my configuration, but I didn't found any public IPv4 address in my configuration.. Especially the Agent which connects to my GitLab instance is hidden in a private subnet and uses NAT to acces GitLab. Thus I do not have any public IPv4 address. What is the reason to assign a public IPv4 address in your scenario? No NAT at all? Could you share some insights please? |
We do not use NAT gateways in order to avoid IP based rate limiting. We basically want all our workers to have an exclusive IP so things like pulling dependencies, containers or cache does not get rate limited by the hosting services. We use hundreds of workers on a daily basis, so making them all use the same IP address would most likely cause this. It would be awesome to have an example showing how to configure the module to only use IPv6 workers. |
Understood, yes. We have a proxy in place for Docker, Maven, NPM and all the other stuff, so I haven't seen this problem so far. As SSM is not ready for IPv6 we have to switch to the SecretsManager for the tokens which adds some additions costs ($0.40/secret + costs per 10,000 reads). |
Is this helpful for your setup? |
I couldn't figure it out even with this for ssm ; I've saw this yes. The URL is hard coded in ipv4 inside the gitlab-runner (or I didnt found the way to change it in conf) when asking EC2 to spawn minions, so it seems that it is not possible to do it currently :( I just accepted the fact to pay a little bit more for now I didn't took the time (and don't have much) to check if I can do a PR on gitlab-runner side to add this configuration |
Just added #1095 Could this solve your problem? |
This issue is stale because it has been open 60 days with no activity. Remove stale label or comment or this will be closed in 15 days. |
This issue was closed because it has been stalled for 15 days with no activity. |
Describe the solution you'd like
I would like to be able to use this module without using ipv4, since AWS will update their pricing soon: https://aws.amazon.com/fr/blogs/aws/new-aws-public-ipv4-address-charge-public-ip-insights/
Describe alternatives you've considered
I've trying to adjust the configuration of the module, it's working properly in provisioning, but it doesn't after deploying.
The main issue is in using aws ssm in the init script, aws ssm does not support ipv6 see: https://docs.aws.amazon.com/vpc/latest/userguide/aws-ipv6-support.html
Suggest a solution
Add options so we don't need to use any aws ssm command.
It's only in gitlab-runner.tftpl.
The text was updated successfully, but these errors were encountered: