You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Oct 16, 2020. It is now read-only.
Kubernetes may create a number of different interfaces for CNI plugins. CoreOS Linux should not have networkd run over these interfaces.
Here is an example output:
$ ip addr show dev cni0
6: cni0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1472 qdisc noqueue state UP group default qlen 1000
link/ether 0a:58:0a:02:01:01 brd ff:ff:ff:ff:ff:ff
inet 10.2.1.1/24 scope global cni0
valid_lft forever preferred_lft forever
inet6 fe80::ec7e:9ff:fe5d:192f/64 scope link
valid_lft forever preferred_lft forever
We should still add a file to ignore all cni* interfaces, I guess the issue should be open until that's actually fixed. We now have the prerequisite, but we still have to manually verify that it doesn't break the CNI interfaces.
Desired Feature
Kubernetes may create a number of different interfaces for CNI plugins. CoreOS Linux should not have networkd run over these interfaces.
Here is an example output:
We have a few different options:
xref flannel-io/flannel#533
The text was updated successfully, but these errors were encountered: