-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
aws: fix maxPods when cilium ipam=eni is used #16253
aws: fix maxPods when cilium ipam=eni is used #16253
Conversation
|
Welcome @argusua! |
Hi @argusua. Thanks for your PR. I'm waiting for a kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Hi @argusua. Thanks for taking the time to submit a PR. |
17c0c5b
to
191add6
Compare
191add6
to
aa26093
Compare
Done. |
aa26093
to
7050b01
Compare
/ok-to-test |
Can someone help with failed tests? Because for me it's not clear why they are failing. I've tried building and running nodeup on my test cluster with amazonvpc and cilium cni and it works correctly. |
Thanks, @hakman It was also my thought but not clear why I can't recreate this on my local cluster. Anyway, I've commited your suggestion. Let's if this helps. |
/retest-required |
/test pull-kops-e2e-k8s-aws-calico |
Hi, @hakman |
Thanks @argusua. If you don't mind, could you also squash the commits? |
Co-authored-by: Ciprian Hacman <ciprian@hakman.dev>
2f0e6b7
to
d9075f1
Compare
Hi, @hakman |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: hakman The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
What does this PR introduce?
This PR addresses the issue where kubelet is configured with maxPods 100 in the AWS environment and when cilium with ipam=eni is used.
Why is this change needed?
The number of IP addresses is connected to the AWS instance type and is much less than 100 which is the default maxPods value. So, for small instance types we in most cases end up with the pod not being able to schedule because of 'No IP's left to assign on aws instances'
How does it address the issue?
We use the same code to determine maxPods per AWS instance type as for amazonvpc networking.
Related Issue
Fixes #16064