-
-
Notifications
You must be signed in to change notification settings - Fork 4.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: Add support for networking ip_family
which enables support for IPV6
#1759
feat: Add support for networking ip_family
which enables support for IPV6
#1759
Conversation
…ws-eks into feat/ipv6-support
@bryantbiggs this looks great to me, now that the AWS provider v3.72.0 do you anticipate this can be released soon? |
…ws-eks into feat/ipv6-support
@stevehipwell yes! I just wanted to have at least one deploy to ensure it works as advertised. Just launched a cluster this morning and everythings looking good |
@stevehipwell just trying to figure out why the CoreDNS plugin is not registering as healthy under IPV6 - working through this now https://aws.amazon.com/blogs/containers/amazon-eks-launches-ipv6-support/ - let me know if you have any insight (see |
@bryantbiggs I assume you're using the latest cordns version ( Have you looked at the bootstrap options to see if there is an issue with the old logic? |
@bryantbiggs We observed a while back that when launching a new cluster, compute nodes need to be available before the CoreDNS plugin will launch successfully. Since we manage the cluster addons outside of the module we solved this by simply putting a Note that this happens on IPv4 clusters as well, so it's not related to your changes here. |
Ya, the addons are all pulling the latest versions that are specified in the announcement. I assume there are no changes in the bootstrap logic (I hope) - I would presume this is all handled in the |
Yes, this works today in the |
Between this module and MSK, talk about longest turn around time to test out changes 😅 🕐 |
ah, might be a permissions issue https://docs.aws.amazon.com/eks/latest/userguide/cni-iam-role.html#cni-iam-role-create-ipv6-policy
|
b20c1a0
to
42379d4
Compare
42379d4
to
d6d01f7
Compare
## [18.1.0](v18.0.6...v18.1.0) (2022-01-14) ### Features * Add support for networking `ip_family` which enables support for IPV6 ([#1759](#1759)) ([314192e](314192e))
This PR is included in version 18.1.0 🎉 |
## [18.1.0](terraform-aws-modules/terraform-aws-eks@v18.0.6...v18.1.0) (2022-01-14) ### Features * Add support for networking `ip_family` which enables support for IPV6 ([#1759](terraform-aws-modules/terraform-aws-eks#1759)) ([c016dfb](terraform-aws-modules/terraform-aws-eks@c016dfb))
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems related to this change, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
Description
ip_family
which enables support for IPV6AmazonEKS_CNI_IPv6_Policy
for nodes using VPC CNI to connect when IPV6 is enabledcluster_ip_family
down to sub-modules to be able to determine which CNI policy should be usediam_role_attach_cni_policy
variable to control whether the CNI policy should be attached or notip_family
attributeeks-managed-node-group
example to demonstrate/validate use of IPV6Note: IPV6 can only be enabled on new clusters, not existing. So the addition of the IPV6 rule on the security groups is non-breaking (does not affect current clusters either)
Motivation and Context
Breaking Changes
How Has This Been Tested?
examples/*
projectseks-managed-node-group
example