-
Notifications
You must be signed in to change notification settings - Fork 578
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
✨ Filter CNI subnets when creating EKS NodeGroup #4800
✨ Filter CNI subnets when creating EKS NodeGroup #4800
Conversation
Hi @mnitchev. Thanks for your PR. I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
f96a91a
to
e422269
Compare
/ok-to-test |
/test pull-cluster-api-provider-aws-e2e |
/retest |
PR needs rebase. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
929d121
to
205bcb4
Compare
@cnmcavoy @dlipovetsky Can you please review? CI is green |
/test pull-cluster-api-provider-aws-e2e |
02a704f
to
355b6d8
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
Can we make the release notes clearer? The word "filter" can mean different things (include vs. exclude). Suggestion:
Exclude CNI subnets when creating EKS NodeGroup with private availability zone subnet type.
I stumbled over the problem as well that the subnet filtering functions can return subnets from secondary CIDR blocks (as part of #4898). In most places of CAPA, most likely the code only assumes subnets from the primary CIDR. Maybe @richardcase or other maintainers, do you have experience with this networking code? |
Some more occurrences must be fixed so CAPA doesn't choose subnets from the secondary CIDR by mistake, e.g. to run EC2 instances. But I can take care of those via #4898. /lgtm |
/assign @Ankitasw for approval if you don't have concerns |
/test ? |
@richardcase: The following commands are available to trigger required jobs:
The following commands are available to trigger optional jobs:
Use
In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/test pull-cluster-api-provider-aws-e2e |
Failed due to timeouts. /retest |
/test pull-cluster-api-provider-aws-e2e |
@richardcase tests seem to have worked fine now. |
/approve |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: Ankitasw The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
What type of PR is this?
/kind feature
What this PR does / why we need it:
Not sure if this is a bug or a feature. I don't think it's intended for nodes to land on the subnets intended for CNI, but if it is then I can also change this PR to add another
AZSubnetType
.Special notes for your reviewer:
Checklist:
Release note: