networkd: Add settings for Calico's IP-in-IP tunnel#26
Merged
pothos merged 1 commit intoflatcar-masterfrom Sep 11, 2020
Merged
Conversation
The tunnel interface tunl0 was getting the default setup of DHCP and TX offload. Since Calico set up the IP address, the interface was working but thought to be in "configuring" state by networkd which is harmless but still not optimal. Recently the TX offload caused Pod-to-Pod communication through the tunnel to break because the checksums were not calculated. Set the tunnel interface to be not managed by networkd's default setup with DHCP. Disable the TX offload to enforce checksum calculation. See flatcar/Flatcar#183
t-lo
approved these changes
Sep 11, 2020
Member
t-lo
left a comment
There was a problem hiding this comment.
LGTM, thanks! Please cherry-pick the build recipe update in coreos-overlay to flatcar-2605, too.
pothos
added a commit
to flatcar-archive/coreos-overlay
that referenced
this pull request
Sep 11, 2020
pothos
added a commit
to flatcar-archive/coreos-overlay
that referenced
this pull request
Sep 11, 2020
jepio
pushed a commit
that referenced
this pull request
Feb 21, 2022
dracut: issue a kernel panic on dm-verity corruption
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
The tunnel interface tunl0 was getting the default setup of DHCP
and TX offload. Since Calico set up the IP address, the interface
was working but thought to be in "configuring" state by networkd
which is harmless but still not optimal. Recently the TX offload
caused Pod-to-Pod communication through the tunnel to break because
the checksums were not calculated.
Set the tunnel interface to be not managed by networkd's default
setup with DHCP. Disable the TX offload to enforce checksum
calculation.
See flatcar/Flatcar#183
How to use
Schedule two Kubernetes Pods on one node each with Calico and send UDP or TCP packets.
Testing done
The files were manually placed on the node under
/etc/systemd/network.