-
Notifications
You must be signed in to change notification settings - Fork 212
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore: remove azure-vnet binaries which are installed from container #4295
Conversation
Pull Request Test Coverage Report for Build 9274280896Details
💛 - Coveralls |
a52ab47
to
e7da447
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Should we always not install cni for swift and overlay cni on WIndows nodes?
Currently we always call Install-VnetPlugins to install azurecni set in VNetCNIPluginsURL.
If we do not need to install swift and overlay cni, I think that rp can set it to empty and we can ignore it in Windows CSE.
Same question for Set-AzureCNIConfig
https://github.com/Azure/AgentBaker/blob/master/staging/cse/windows/azurecnifunc.ps1
The CNI binary is being installed via init-container in swift and overlay, on Linux and Windows, and we don't need to bake it in to the Nodes anymore. It will also be installed via init-container in node-subnet/legacy for k8s 1.30+, so I left it there for now to keep supporting <=1.29. However, I forgot that these tarballs also have the CNI conflist. We still need the conflist baked in for Windows nodes, so I am reverting what I changed on Windows for now. If we can move the conflist responsibility to CNS like we have done on Linux then we can remove them in the future. |
e7da447
to
2d02129
Compare
2d02129
to
12f0d72
Compare
62797dd
to
199e6ea
Compare
199e6ea
to
4225c64
Compare
@AbelHu can you remove the block, I have reverted any change to Windows VHD for now. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
lgtm, thanks!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Need to follow rp release with best effort.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
but yes lets go!
4225c64
to
4ccf0f5
Compare
4ccf0f5
to
d28f538
Compare
…ontainers Signed-off-by: Evan Baker <[email protected]>
d28f538
to
353169d
Compare
We have noticed after updating our nodes that the Example of our Daemonset: initContainers:
- args:
- deploy
- --skip-verify
- azure-vnet
- -o
- /opt/cni/bin/azure-vnet
- azure-vnet-telemetry
- -o
- /opt/cni/bin/azure-vnet-telemetry
- azure-swift.conflist
- -o
- /etc/cni/net.d/15-azure-swift.conflist Elsewhere we can see in the azure-container-networking repositories that this is created by dropz where it has the following args to generate 10-azure.conflist. See: https://github.com/Azure/azure-container-networking/blob/de225e4d34f824c641a7cce906039addf8f64d49/.pipelines/mdnc/azure-cns-cni-1.5.4.yaml#L102C10-L102C208 Is this intentional or a regression? Newer nodes don't seem to have the |
hi @james-bjss I don't think the issue you described is related to this PR. Could you please create a new GitHub issue in https://github.com/Azure/AKS and tag me? It would be helpful to include this information about your cluster (which you can get from
Thanks! |
Sure my colleague @fozturner is going to pick this up and raise a new issue. Agreed, we did some further testing and it seems unlikely its related to the above. Done: Azure/AKS#4349 |
What type of PR is this?
/kind cleanup
What this PR does / why we need it:
Remove azure-vnet-cni-swift and azure-vnet-cni-overlay tarballs which have been superseded by dropgz images.
Which issue(s) this PR fixes:
Fixes #
Requirements:
Special notes for your reviewer:
Release note: