Skip to content

Support for new AWS VPC CNI custom subnets used by EKS Pods from secondary CIDR range #895

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
Constantin07 opened this issue Feb 16, 2023 · 11 comments

Comments

@Constantin07
Copy link

Is your request related to a problem? Please describe.

This is feature request for adding a new type of subnets in VPC - specifically the one used EKS pods (VPC CNI Custom networking) from VPC secondary CIDR range.

Why?

I want to have a distinct subnets for EKS Pods from CG-NAT space, i.e. 100.64.0.0/10.
They should be routable via NAT Gateway, etc. as Pods need access to internet (similar to elasticache).

Describe the solution you'd like.

Being able to define in vpc module something like:

module "vpc" {
...
    # VPC CNI custom subnets for EKS pods
    customcni_subnets            = ...
    customcni_subnet_names = ...

Describe alternatives you've considered.

At the moment I'm using elasticsearch subnets but this is a bit misleading in name.

module "vpc" {
...
    # Using elasticsearch subnets for EKS pods network as intra ones have no outbound access via NAT Gateway
    elasticache_subnets            = ...
    elasticache_subnet_names = ...

Additional context

EKS Custom Networking
AWS CNI Custom networking

@github-actions
Copy link

This issue has been automatically marked as stale because it has been open 30 days
with no activity. Remove stale label or comment or this issue will be closed in 10 days

@github-actions github-actions bot added the stale label Mar 19, 2023
@Constantin07
Copy link
Author

/remove stale

@github-actions github-actions bot removed the stale label Mar 20, 2023
@ForbiddenEra
Copy link

See my comment in #918 as well but I think #892 should be considered as a potential way forward for handling subnets; if not exactly how suggested there, at least improving the flexibility should be considered, it seems like a few users are wanting more flexibility with subnet groups/their naming/etc.

@github-actions
Copy link

This issue has been automatically marked as stale because it has been open 30 days
with no activity. Remove stale label or comment or this issue will be closed in 10 days

@github-actions github-actions bot added the stale label May 12, 2023
@Constantin07
Copy link
Author

/remove stale

@github-actions github-actions bot removed the stale label May 13, 2023
@github-actions
Copy link

This issue has been automatically marked as stale because it has been open 30 days
with no activity. Remove stale label or comment or this issue will be closed in 10 days

@github-actions github-actions bot added the stale label Jun 12, 2023
@Constantin07
Copy link
Author

/remove stale

@github-actions github-actions bot removed the stale label Jun 13, 2023
@ForbiddenEra
Copy link

/preemptive remove stale ;)

@github-actions
Copy link

github-actions bot commented Aug 2, 2023

This issue has been automatically marked as stale because it has been open 30 days
with no activity. Remove stale label or comment or this issue will be closed in 10 days

@github-actions github-actions bot added the stale label Aug 2, 2023
@github-actions
Copy link

This issue was automatically closed because of stale in 10 days

@github-actions github-actions bot closed this as not planned Won't fix, can't repro, duplicate, stale Aug 13, 2023
@github-actions
Copy link

I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.

@github-actions github-actions bot locked as resolved and limited conversation to collaborators Sep 12, 2023
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants