Skip to content

[terraform/aws] Install Calico after deleting the default CNI #12953

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
Tracked by #12709
nandajavarma opened this issue Sep 14, 2022 · 4 comments
Closed
Tracked by #12709

[terraform/aws] Install Calico after deleting the default CNI #12953

nandajavarma opened this issue Sep 14, 2022 · 4 comments
Assignees
Labels
meta: stale This issue/PR is stale and will be closed soon self-hosted: reference-architecture team: delivery Issue belongs to the self-hosted team

Comments

@nandajavarma
Copy link
Contributor

nandajavarma commented Sep 14, 2022

This is a big step missing towards syncing the terraform module with the reference architecture. Follow the discussion here https://gitpod.slack.com/archives/C01KLC56NP7/p1663153953823739

@Pothulapati
Copy link
Contributor

If folks haven't started working on this, I'm happy to take it up! @nandajavarma @adrienthebo

@nandajavarma
Copy link
Contributor Author

Yup! I was not planning to pick this up before the quarter ends. Please go ahead!

@Pothulapati
Copy link
Contributor

This seems to be related #12492

Pothulapati added a commit that referenced this issue Sep 29, 2022
Fixes #12953

This PR updates the EKS single cluster reference guides to install
calico as the CNI. This is important for the network policies tools
to work.

For GKE and AKS, There are already options to do the same which we
use already instead of doing it like this.

Signed-off-by: Tarun Pothulapati <[email protected]>
Pothulapati added a commit that referenced this issue Sep 30, 2022
Fixes #12953

This PR updates the EKS single cluster reference guides to install
calico as the CNI. This is important for the network policies
to work.

For GKE and AKS, There are already options to do the same which we
use already instead of doing it manually.

Signed-off-by: Tarun Pothulapati <[email protected]>
Pothulapati added a commit that referenced this issue Sep 30, 2022
Fixes #12953

This PR updates the EKS single cluster reference guides to install
calico as the CNI. This is important for the network policies
to work.

For GKE and AKS, There are already options to do the same which we
use already instead of doing it manually.

Signed-off-by: Tarun Pothulapati <[email protected]>
@Pothulapati Pothulapati moved this from 📓Scheduled to ⚒In Progress in 🚚 Security, Infrastructure, and Delivery Team (SID) Oct 3, 2022
Pothulapati added a commit that referenced this issue Oct 3, 2022
Fixes #12953

This PR updates the EKS single cluster reference guides to install
calico as the CNI. This is important for the network policies
to work.

For GKE and AKS, There are already options to do the same which we
use already instead of doing it manually.

Signed-off-by: Tarun Pothulapati <[email protected]>
@stale
Copy link

stale bot commented Jan 2, 2023

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.

@stale stale bot added the meta: stale This issue/PR is stale and will be closed soon label Jan 2, 2023
@stale stale bot closed this as completed Jun 12, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
meta: stale This issue/PR is stale and will be closed soon self-hosted: reference-architecture team: delivery Issue belongs to the self-hosted team
Projects
No open projects
Development

Successfully merging a pull request may close this issue.

3 participants