Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

MultusDynamicNetworks fails on containerd systems #1846

Open
KrystianMarek opened this issue Aug 7, 2024 · 4 comments
Open

MultusDynamicNetworks fails on containerd systems #1846

KrystianMarek opened this issue Aug 7, 2024 · 4 comments
Labels
kind/bug lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed.

Comments

@KrystianMarek
Copy link

What happened:
The addons operator deployed as per instruction
with:

apiVersion: networkaddonsoperator.network.kubevirt.io/v1
kind: NetworkAddonsConfig
metadata:
  name: cluster
spec:
  multus: {}
  multusDynamicNetworks: {}
  linuxBridge: {}
  kubeMacPool: {}
  ovs: {}
  macvtap: {}
  kubeSecondaryDNS: {}
  kubevirtIpamController: {}
  imagePullPolicy: Always

By default deploys multus crio dynamic network controller
Rendering the controller broken when deployed on a system with containerd. There is another manifest dedicated to containerd systems this. NetworkAddonsConfig.spec.multusDynamicNetworks does not allow any configuration, not even choosing the correct manifest.

What you expected to happen:
multusDynamicNetworks works on systems with containerd

How to reproduce it (as minimally and precisely as possible):
Deploy NetworkAddonsConfig mentioned above on a system with containerd, for example ubuntu.

Workaround:
Disable multusDynamicNetworks by deploying

apiVersion: networkaddonsoperator.network.kubevirt.io/v1
kind: NetworkAddonsConfig
metadata:
  name: cluster
spec:
  imagePullPolicy: IfNotPresent
  kubeMacPool: {}
  kubeSecondaryDNS: {}
  kubevirtIpamController: {}
  linuxBridge: {}
  macvtap: {}
  multus: {}
  ovs: {}

Deploy dynamic-networks-controller separately. Be mindful of namespaces. Cluster network addons operator deploys to cluster-network-addons namespace.

Environment:

  • KubeVirt version (use virtctl version): 1.3.0
  • Kubernetes version (use kubectl version): v1.28.6
  • VM or VMI specifications: N/A
  • Cloud provider or hardware configuration: bare metal
  • OS (e.g. from /etc/os-release): ubuntu
  • Kernel (e.g. uname -a): N/A
  • Install tools: N/A
  • Others: N/A
@maiqueb
Copy link
Contributor

maiqueb commented Aug 7, 2024

/cc

@oshoval
Copy link
Collaborator

oshoval commented Aug 14, 2024

maybe this one suggests the solution #1804 ?

@kubevirt-bot
Copy link
Collaborator

Issues go stale after 90d of inactivity.
Mark the issue as fresh with /remove-lifecycle stale.
Stale issues rot after an additional 30d of inactivity and eventually close.

If this issue is safe to close now please do so with /close.

/lifecycle stale

@kubevirt-bot kubevirt-bot added the lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. label Nov 12, 2024
@kubevirt-bot
Copy link
Collaborator

Stale issues rot after 30d of inactivity.
Mark the issue as fresh with /remove-lifecycle rotten.
Rotten issues close after an additional 30d of inactivity.

If this issue is safe to close now please do so with /close.

/lifecycle rotten

@kubevirt-bot kubevirt-bot added lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed. and removed lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. labels Dec 12, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/bug lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed.
Projects
None yet
Development

No branches or pull requests

4 participants