-
-
Notifications
You must be signed in to change notification settings - Fork 4.5k
Support for new AWS VPC CNI custom subnets used by EKS Pods from secondary CIDR range #895
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
This issue has been automatically marked as stale because it has been open 30 days |
/remove stale |
See my comment in #918 as well but I think #892 should be considered as a potential way forward for handling subnets; if not exactly how suggested there, at least improving the flexibility should be considered, it seems like a few users are wanting more flexibility with subnet groups/their naming/etc. |
This issue has been automatically marked as stale because it has been open 30 days |
/remove stale |
This issue has been automatically marked as stale because it has been open 30 days |
/remove stale |
/preemptive remove stale ;) |
This issue has been automatically marked as stale because it has been open 30 days |
This issue was automatically closed because of stale in 10 days |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
Is your request related to a problem? Please describe.
This is feature request for adding a new type of subnets in VPC - specifically the one used EKS pods (VPC CNI Custom networking) from VPC secondary CIDR range.
Why?
I want to have a distinct subnets for EKS Pods from CG-NAT space, i.e. 100.64.0.0/10.
They should be routable via NAT Gateway, etc. as Pods need access to internet (similar to
elasticache
).Describe the solution you'd like.
Being able to define in
vpc
module something like:Describe alternatives you've considered.
At the moment I'm using
elasticsearch
subnets but this is a bit misleading in name.Additional context
EKS Custom Networking
AWS CNI Custom networking
The text was updated successfully, but these errors were encountered: