Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

multinode fails conformance test with kindnet (but calico works) #9825

Closed
azhao155 opened this issue Dec 2, 2020 · 5 comments · Fixed by #10985
Closed

multinode fails conformance test with kindnet (but calico works) #9825

azhao155 opened this issue Dec 2, 2020 · 5 comments · Fixed by #10985
Labels
area/cni CNI support kind/bug Categorizes issue or PR as related to a bug. lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. priority/important-longterm Important over the long term, but may not be staffed and/or may need multiple releases to complete.

Comments

@azhao155
Copy link
Contributor

azhao155 commented Dec 2, 2020

Run the conformance test with default kindnet cni. Tests failed due to coreDNS can't resolve service name on the non-mater nodes.

Run the same test for calico cni for both docker and containerd runtime. All passed.

There are two things we could do:

  1. Change default cni to a more lightweight one which pass all the conformance tests.
  2. Investigate the kindnet dns issue.

The attachment are the tests log for calico with docker and containerd runtime.

e2e.log
e2e.log

@azhao155
Copy link
Contributor Author

azhao155 commented Dec 2, 2020

@medyagh
@sharifelgamal

@tstromberg tstromberg added area/cni CNI support priority/important-longterm Important over the long term, but may not be staffed and/or may need multiple releases to complete. labels Dec 10, 2020
@tstromberg tstromberg changed the title Multi node with default kindnet cni doesn't pass k8s conformance test. But calico cni pass for both docker and containerd runtime. multinode fails conformance test with kindnet (but calico works) Dec 14, 2020
@tstromberg
Copy link
Contributor

I imagine that the CoreDNS issue might be that the non-master node can't access CoreDNS on the master.

I'd be open to switching CNI's if another works as well without a performance penalty.

Any movement on this?

@tstromberg tstromberg added the kind/bug Categorizes issue or PR as related to a bug. label Dec 14, 2020
@sharifelgamal
Copy link
Collaborator

I think we'd need to do some benchmarking with each of the passing CNI and figure out the best path forward that way. In addition, there was a PR (#9875) that will have probably fixed kindnet in general. We should rerun conformance with kindnet to double check.

@fejta-bot
Copy link

Issues go stale after 90d of inactivity.
Mark the issue as fresh with /remove-lifecycle stale.
Stale issues rot after an additional 30d of inactivity and eventually close.

If this issue is safe to close now please do so with /close.

Send feedback to sig-contributor-experience at kubernetes/community.
/lifecycle stale

@k8s-ci-robot k8s-ci-robot added the lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. label Mar 14, 2021
@prezha
Copy link
Contributor

prezha commented Apr 5, 2021

i think this issue could be resolved by #10985 with kindnet cni

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/cni CNI support kind/bug Categorizes issue or PR as related to a bug. lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. priority/important-longterm Important over the long term, but may not be staffed and/or may need multiple releases to complete.
Projects
None yet
Development

Successfully merging a pull request may close this issue.

6 participants