You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Allow excluding node subnets from auto discovery when ENABLE_SUBNET_DISCOVERY = "true" and node subnets tagged with kubernetes.io/role/cni=0. Exclusions should apply for pods that doesn't require host network (spec.hostNetwork=true).
Why is this needed:
If EKS clusters are provisioned with smaller subnets to host node groups, scheduling pods in the same subnets will limit the number of IP addresses assigned to other AWS resources or additional nodes. At the same time, secondary CIDRs may be used for pod IP pools only.
Example: this would benefit a multi-account network architecture with isolation of resources meant to be shared with other accounts VPCs over transit gateway or peering connections, and pods in secondary CIDRs, connected to transit gateways via NAT Gateways.
The text was updated successfully, but these errors were encountered:
What would you like to be added:
Allow excluding node subnets from auto discovery when
ENABLE_SUBNET_DISCOVERY = "true"
and node subnets tagged withkubernetes.io/role/cni=0
. Exclusions should apply for pods that doesn't require host network (spec.hostNetwork=true
).Why is this needed:
If EKS clusters are provisioned with smaller subnets to host node groups, scheduling pods in the same subnets will limit the number of IP addresses assigned to other AWS resources or additional nodes. At the same time, secondary CIDRs may be used for pod IP pools only.
Example: this would benefit a multi-account network architecture with isolation of resources meant to be shared with other accounts VPCs over transit gateway or peering connections, and pods in secondary CIDRs, connected to transit gateways via NAT Gateways.
The text was updated successfully, but these errors were encountered: