Lars Ekman
Lars Ekman
### What happened? A test with a non-root container fails on master; ``` vm-002 ~ # kubectl exec -it alpine-test-kc2c5 -- sh ~ $ id uid=1000(1000) gid=3000 ~ $ getcap...
Some time around [linux-5.13](https://github.com/torvalds/linux/commit/10397994d30f2de51bfd9321ed9ddb789464f572) loading fails with; ``` # ./af_xdp_user -d eth1 --filename af_xdp_kern.o libbpf: Netlink-based XDP prog detected, please unload it in order to launch AF_XDP prog ERROR: Can't...
When multiple peer routers are configured, for example `--peer-router-ips="192.168.0.201,192.168.0.202"` then router should be configured to all peer routers. This enables load sharing for outgoing traffic. This is supported when gobgp...
**Is your feature request related to a problem? Please describe.** * [KEP](https://github.com/kubernetes/enhancements/blob/master/keps/sig-network/0031-20181017-kube-proxy-services-optional.md) The `service.kubernetes.io/service-proxy-name` was initially intended to off-load the kube-proxy from handling all services already handled by a service...
See; https://github.com/kubernetes/kubernetes/issues/72236 Same problem in `kube-router` and the same solution.
E2e tests executed with; ``` FOCUS='.*\[Feature:IPv6DualStack\]' export SKIP='Disruptive|Serial|affinity|DNS|GCE|finalizer|ProxyTerminating' ``` ### Test results nft ``` PASSED [sig-network] [Feature:IPv6DualStack] should have ipv4 and ipv6 internal node ip PASSED [sig-network] [Feature:IPv6DualStack] should create...
[Service Internal Traffic Policy](https://kubernetes.io/docs/concepts/services-networking/service-traffic-policy/) is beta in K8s v1.23+. I don't know if this is a backend-only problem, or if the problem is in "main kpng". Anyway all backends I...
First; ### Please do *not* check modules! That is a _very wrong_ path, please read https://github.com/kubernetes/kubernetes/issues/108579#issuecomment-1125675626. But `kpng` shouldn't segv for whatever reason so this should be fixed. In my...
K8s e2e-test; ``` [sig-network] Services should allow pods to hairpin back to themselves through services # (suggested FOCUS='.*hairpin.back.to.themselves.*') ``` This test fails for backends; * `nft` * `ipvs` but succeeds...
## Expected Behavior The generic NSM frameworks shall not have any dependency towards a specific data-plane. It should be possible to use NSM for networks/endpoints/services, possibly own-developed, without loading the...