Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Disabling SNAT for non-managed ENIs possible? #2927

Open
muelleme opened this issue May 27, 2024 · 1 comment
Open

Disabling SNAT for non-managed ENIs possible? #2927

muelleme opened this issue May 27, 2024 · 1 comment

Comments

@muelleme
Copy link

What happened:

Hello!

We have a use-case where we run pods with EKS in host network mode and attach a 2nd ENI to the node. The 2nd ENI is tagged with node.k8s.amazonaws.com/no_manage: true and we expected it to be completely left alone by the CNI. However, the iptables rules set up by the CNI force all traffic going out via that ENI to be SNATed and the source IP gets changed to the primary node IP.
Is that the intended behaviour, and if yes, is there a way to disable this? We do not have a NAT gateway running, so using AWS_VPC_K8S_CNI_EXTERNALSNAT = true is not an option for us, as it breaks all other use cases in the cluster.

Thanks in advance, any help is highly appreciated!

Environment:

  • Kubernetes version (use kubectl version): 1.28
  • CNI Version v1.15.3-eksbuild.1
  • OS (e.g: cat /etc/os-release): amazon-eks-node-1.28-v20240514 AMI
Copy link

This issue is stale because it has been open 60 days with no activity. Remove stale label or comment or this will be closed in 14 days

@github-actions github-actions bot added the stale Issue or PR is stale label Jul 27, 2024
@orsenthil orsenthil removed the stale Issue or PR is stale label Jul 27, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants