--
You received this message because you are subscribed to the Google Groups "kubernetes-sig-network" group.
To unsubscribe from this group and stop receiving emails from it, send an email to kubernetes-sig-ne...@googlegroups.com.
To post to this group, send email to kubernetes-...@googlegroups.com.
Visit this group at https://groups.google.com/group/kubernetes-sig-network.
For more options, visit https://groups.google.com/d/optout.
To unsubscribe from this group and stop receiving emails from it, send an email to kubernetes-sig-network+unsub...@googlegroups.com.
To post to this group, send email to kubernetes-sig-network@googlegroups.com.
--
You received this message because you are subscribed to the Google Groups "kubernetes-sig-network" group.
To unsubscribe from this group and stop receiving emails from it, send an email to kubernetes-sig-ne...@googlegroups.com.
To post to this group, send email to kubernetes-...@googlegroups.com.
Hi Tristan,To throw another option out there (though I haven't done this myself). You might be able to take advantage of Calico's BGP capabilities to peer with your virtual private gateway device. This would allow the VGW to route traffic directly to individual pod IP addresses.
- Casey
On Wed, Aug 31, 2016, 12:26 PM <tris...@cloudera.com> wrote:
Hi All ---Has anybody managed to find a configuration within AWS that makes the pod network fully routable to corporate networks that are connected via a AWS virtual private gateway? My understanding is there are two obvious approaches:1. Carve out part of the subnet CIDR and create a routing rule that maps the pod network cidr to a kubernetes gateway node running Flannel/Calico/Weave. As far as I can tell this doesn't work because AWS doesn't allow routing rules that are more specific that than the subnet local rule.2. Use a cidr that is external to the subnet and create a routing rule between that cidr and a kubernetes node or alternatively use something like the flannel AWS backend to do this automatically. My understanding is that it is still impossible to make this cidr fully routable externally because AWS will not allow traffic into the subnet targeting an external cidr.Any other ideas that don't involve running a custom VPN gateway within the subnet?Thanks,Tristan
You received this message because you are subscribed to the Google Groups "kubernetes-sig-network" group.
To unsubscribe from this group and stop receiving emails from it, send an email to kubernetes-sig-network+unsub...@googlegroups.com.
To post to this group, send email to kubernetes-sig-network@googlegroups.com.
To unsubscribe from this group and stop receiving emails from it, send an email to kubernetes-sig-ne...@googlegroups.com.
To post to this group, send email to kubernetes-...@googlegroups.com.