Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow excluding node subnets from VPC CNI auto discovery via subnet tag #2984

Closed
tvizor opened this issue Jul 12, 2024 · 2 comments
Closed
Labels

Comments

@tvizor
Copy link

tvizor commented Jul 12, 2024

What would you like to be added:

Allow excluding node subnets from auto discovery when ENABLE_SUBNET_DISCOVERY = "true" and node subnets tagged with kubernetes.io/role/cni=0. Exclusions should apply for pods that doesn't require host network (spec.hostNetwork=true).

Why is this needed:

If EKS clusters are provisioned with smaller subnets to host node groups, scheduling pods in the same subnets will limit the number of IP addresses assigned to other AWS resources or additional nodes. At the same time, secondary CIDRs may be used for pod IP pools only.

Example: this would benefit a multi-account network architecture with isolation of resources meant to be shared with other accounts VPCs over transit gateway or peering connections, and pods in secondary CIDRs, connected to transit gateways via NAT Gateways.

Copy link

This issue is stale because it has been open 60 days with no activity. Remove stale label or comment or this will be closed in 14 days

@github-actions github-actions bot added the stale Issue or PR is stale label Sep 11, 2024
Copy link

Issue closed due to inactivity.

@github-actions github-actions bot closed this as not planned Won't fix, can't repro, duplicate, stale Sep 25, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

1 participant