Skip to content

Commit 86cc778

Browse files
committed
Calico Network Policy allowed for multiple pool & subnet
1 parent c5aa07f commit 86cc778

File tree

1 file changed

+1
-2
lines changed

1 file changed

+1
-2
lines changed

articles/aks/use-multiple-node-pools.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -127,8 +127,7 @@ A workload may require splitting a cluster's nodes into separate pools for logic
127127

128128
* All subnets assigned to nodepools must belong to the same virtual network.
129129
* System pods must have access to all nodes/pods in the cluster to provide critical functionality such as DNS resolution and tunneling kubectl logs/exec/port-forward proxy.
130-
* If you expand your VNET after creating the cluster you must update your cluster (perform any managed cluster operation but node pool operations don't count) before adding a subnet outside the original cidr. AKS will error out on the agent pool add now though we originally allowed it. If you don't know how to reconcile your cluster file a support ticket.
131-
* Calico Network Policy is not supported.
130+
* If you expand your VNET after creating the cluster you must update your cluster (perform any managed cluster operation but node pool operations don't count) before adding a subnet outside the original cidr. AKS will error out on the agent pool add now though we originally allowed it. If you don't know how to reconcile your cluster file a support ticket.
132131
* Azure Network Policy is not supported.
133132
* Kube-proxy expects a single contiguous cidr and uses it this for three optmizations. See this [K.E.P.](https://github.com/kubernetes/enhancements/tree/master/keps/sig-network/2450-Remove-knowledge-of-pod-cluster-CIDR-from-iptables-rules) and --cluster-cidr [here](https://kubernetes.io/docs/reference/command-line-tools-reference/kube-proxy/) for details. In Azure cni your first node pool's subnet will be given to kube-proxy.
134133

0 commit comments

Comments
 (0)