-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
default ipv6 subnet to /56 #1903
Conversation
we were defaulting IPv6 subnet to a /64, this was working because kubeadm was calculating and modifying directly the node-cidr-mask, so the controller manager does not complain. Kubeadm should only validate that the config is correct and fail in case of error, this behavior will be changed soon, but once this happen it will break kind default deployment.
/assign @BenTheElder @neolit123 |
/approve |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: aojea, BenTheElder The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
is not the first time I see this |
/retest |
maybe we should hold until that PR is merged, its a breaking change for ipv6 users as far as i can tell, so i'd appreciate more feedback on the PR. /hold EDIT: hm, so this PR is actually blocking the other PR due to CI. |
is the other way around, we can not merge the other without this, and this is not breaking change since we only change the default ipv6 subnet in kind only, that has not any external dependencies |
ok, feel free to remove hold. |
/lgtm |
Thanks Lubomir |
we were defaulting IPv6 subnet to a /64, this was working because
kubeadm was calculating and modifying directly the node-cidr-mask,
so the controller manager does not complain.
Kubeadm should only validate that the config is correct and fail
in case of error, this behavior will be changed soon, but once
this happen it will break kind default deployment.
xref: kubernetes/kubernetes#95723