Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Establish cadence for regularly updating CNI #57

Open
2 tasks
mikebrow opened this issue Jun 8, 2020 · 2 comments
Open
2 tasks

Establish cadence for regularly updating CNI #57

mikebrow opened this issue Jun 8, 2020 · 2 comments

Comments

@mikebrow
Copy link
Member

mikebrow commented Jun 8, 2020

Need to decide when to update CNI and establish a cadence process.

@fuweid
Copy link
Member

fuweid commented Jun 8, 2020

What is new cni cache config apis here? :)

@mikebrow
Copy link
Member Author

mikebrow commented Jun 8, 2020

New stuff to look at for cni
containernetworking/cni#661
Adds an api for:

"Cache the config JSON, CNI_ARGs, and CapabilityArgs on ADD operations,
and remove them on DEL. This allows runtimes to retrieve the cached
information to ensure that the pod is given the same config and options
on DEL as it was given on ADD."
"So @squeed and I talked about it for a while, and decided that yes there are use-cases for changing parts of a given network config underneath the container, but not for switching the network config out entirely. So much like @mars1024 is saying, a delete operation should probably only check network name (and perhaps plugin type) from the config its sending and make sure those match."
"I think the config caching that this PR does is probably OK, since all it does is allow the runtime (dockershim, crio, etc) to retrieve that config. Then the runtime can make the decision about whether to use an existing updated configuration that it already knows about, or if that's no longer valid (eg old config deleted entirely) it could use the cached config."
"Does that sound OK to everyone? eg libcni only does the storage/retrieval, while the runtime itself can make policy decisions about how to handle config changes."

new stuff for plugins:
Check support
containernetworking/plugins#264

New plugins:
bandwidth - limit incoming and outgoing bandwidth (#96), (#138).
firewall - add containers to firewall rules (#290).
sbr - convert container routes to source-based routes (#212).
static - assign a fixed IP address (#136), (#165).
win-bridge, win-overlay: Windows plugins (#193), (#215).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants