Replies: 3 comments 1 reply
-
|
AWS:
|
Beta Was this translation helpful? Give feedback.
-
|
Networking, network policies and workload isolation are all intricately linked. Having looked at Calico and Cilium in some detail, Cilium has at least one significant advantage over Calico. Layer 7 policies in Cilium are part of the free open source version while you need an enterprise license for Calico. This allows us to control ingress/egress at a pod level which will be critical for JupyterHub workspaces. We currently use Kubenet at Lancs but can switch to Azure CNI. The main difference is that the VNET where the cluster is hosted should have a sufficiently large address space when using Azure CNI or AWS VPC CNI as every pod (and service and node) draws an IP address from this VNET. In peered networks, this could potentially result in IP address exhaustion (a problem another project ran into in the region). |
Beta Was this translation helpful? Give feedback.
-
|
+1 for Cilium. ARC TRE and FRIDGE are using it |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
All Kubernetes distributions include some sort of default Container Network Interface (CNI) provider, but they may not support all features required by K8TRE. For example, some have only partial support for Network Policies. We should define the capabilities that a CNI must provide for K8TRE, and examples of how that can be configured on our official supported platforms.
Beta Was this translation helpful? Give feedback.
All reactions