restrict pod<->pod traffic to a certain NIC on the host (Using Calico) #6061
-
Environmental Info: rke2 version v1.26.15+rke2r1 (a413a7f) Node(s) CPU architecture, OS, and Version: Linux rke2-prod1-worker1 6.1.0-21-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.90-1 (2024-05-03) x86_64 GNU/Linux Cluster Configuration: 3 server nodes, 2 worker nodes. all nodes live on the same subnet, but the worker nodes have a second NIC in a different subnet for communicating to our SAN for pvcs Describe the bug: pod-to pod traffic seems to be communicating across both NICs on our worker nodes. I'd really like to restrict pod-pod traffic to only one NIC. I've messed with the routing tables on the nodes to block force the nodes to not see each other on the SAN subnet, but then I start getting CoreDNS failures and other pod-pod issues. Is there an easy way to tell calico that all pod-pod traffic needs to go out a certain NIC/subnet? they have the same name on all nodes if that's helpful |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 4 replies
-
If you set this config https://docs.tigera.io/calico/latest/reference/installation/api#operator.tigera.io/v1.NodeAddressAutodetection it will pick the interface you set |
Beta Was this translation helpful? Give feedback.
-
I was able to set this in the cluster config in rancher, and the setting populated. I believe it's working but I'll continue to test. thanks! |
Beta Was this translation helpful? Give feedback.
If you set this config https://docs.tigera.io/calico/latest/reference/installation/api#operator.tigera.io/v1.NodeAddressAutodetection it will pick the interface you set