-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Default CNI to enabled, even for Docker runtime #14760
Comments
This also means that installing CNI needs to be added to the documentation, for "none" driver: https://minikube.sigs.k8s.io/docs/drivers/none/ But it needed that for containerd and cri-o, anyway... Currently they both output an ugly warning: // default container runtime varies, starting with Kubernetes 1.24 - assume that only the default container runtime has been tested
rtime := viper.GetString(containerRuntime)
if rtime != constants.DefaultContainerRuntime && rtime != defaultRuntime(getKubernetesVersion(nil)) {
out.WarningT("Using the '{{.runtime}}' runtime with the 'none' driver is an untested configuration!", out.V{"runtime": rtime})
} |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close not-planned |
@k8s-triage-robot: Closing this issue, marking it as "Not Planned". In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
With the release of cri-dockerd 0.2.5, it now defaults to CNI... So it should be recommended, for all runtimes and single-node.
Previously it was only enabled for runtimes using CRI, such as containerd and cri-o, or multi-node. But now, also for docker.
This also applies to "none" driver, which has some weird special case (breaking containerd!)
From before, the default CNI plugin is "kindnet" for KIC and multi-node and "bridge" otherwise.
To be conservative with ancient versions, it can use the dockershim change point (1.24.0-alpha.2)
It was suggested before: #6094 (to use CNI), but then it was regarded as overkill (similar to CRI)
Docs: Usage of the alternative CRI-O runtime #2207containerd and crio should default to --network-plugin-cni --enable-default-cni #3567Basically, rules and interfaces only applied to "others"...
Now
crictl
and/opt/cni/bin
are needed everywhere.The text was updated successfully, but these errors were encountered: