Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

adding node affinity for Fargate #792

Merged
merged 1 commit into from
Jan 16, 2020
Merged

adding node affinity for Fargate #792

merged 1 commit into from
Jan 16, 2020

Conversation

nithu0115
Copy link
Contributor

Issue #, if available: N/A

Description of changes:

Upon creating new EKS version ( 1.14 k8s version), it comes with default 1.5.3 CNI version which comes with nodeAffinity for Fargate. However, the same parameters are missing on Github.

By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.

- key: eks.amazonaws.com/compute-type
operator: NotIn
values:
- fargate
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@nithu0115 is this addressing a specific problem you've run into with customers? I closed a similar issue (#755) stating that we didn't want to place EKS-specific configuration values into the CNI plugin's YAML manifests because CNI can and should run everywhere, not just EKS. Do you disagree with that?

Copy link
Contributor Author

@nithu0115 nithu0115 Jan 14, 2020

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@jaypipes I agree up to a point, but the source of truth for customer to upgrade to latest CNI version (to 1.5.5) from default 1.5.3 version is still GitHub as per EKS public documentation.

IMO, we should have this node affinity params to provide clean upgrade experience, and should have a strategy to remove them (like introducing customer to helms charts) going forward.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Chatted with @mogren about this some more this morning. He has convinced me that this won't do any harm, and although my objective is to keep EKS-specific items out of the VPC CNI configuration, this won't harm anyone running the VPC CNI plugin on non-EKS k8s on AWS

@nithu0115 nithu0115 requested a review from jaypipes January 14, 2020 15:23
- key: eks.amazonaws.com/compute-type
operator: NotIn
values:
- fargate
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Chatted with @mogren about this some more this morning. He has convinced me that this won't do any harm, and although my objective is to keep EKS-specific items out of the VPC CNI configuration, this won't harm anyone running the VPC CNI plugin on non-EKS k8s on AWS

@jaypipes jaypipes merged commit 02e55fd into aws:master Jan 16, 2020
mogren pushed a commit to mogren/amazon-vpc-cni-k8s that referenced this pull request Jan 31, 2020
jaypipes pushed a commit that referenced this pull request Jan 31, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants