Closed neoakris closed 6 months ago
@neoakris, thanks for the feedback. For the subnet tagging, we can add link to the subnet auto discovery live docs (https://kubernetes-sigs.github.io/aws-load-balancer-controller/v2.4/deploy/subnet_discovery/). If you have any changes in mind, feel free to raise a PR.
/kind documentation
@kishorj @M00nF1sh @johngmyers https://engineering.doit.com/demystifying-the-kubernetes-aws-lb-controller-5e06ad0f276d I wrote a blog post about this project that I wanted to put on your radar. I'm also trying to work with my employer's AWS partnership rep to have their docs team get eyes on it to see if they can help in terms of AWS's public docs.
Also about PR: I need to study for 4 exam recertifications that are lapsing, but I'll set a slack reminder to check the docs at the end of the year. If no one was able to get to it within a few months, I'll try to make a 1-2 doc related PRs when some spare time free's up later in the year.
The Kubernetes project currently lacks enough contributors to adequately respond to all issues.
This bot triages un-triaged issues according to the following rules:
lifecycle/stale
is appliedlifecycle/stale
was applied, lifecycle/rotten
is appliedlifecycle/rotten
was applied, the issue is closedYou can:
/remove-lifecycle stale
/close
Please send feedback to sig-contributor-experience at kubernetes/community.
/lifecycle stale
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues.
This bot triages un-triaged issues according to the following rules:
lifecycle/stale
is appliedlifecycle/stale
was applied, lifecycle/rotten
is appliedlifecycle/rotten
was applied, the issue is closedYou can:
/remove-lifecycle rotten
/close
Please send feedback to sig-contributor-experience at kubernetes/community.
/lifecycle rotten
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs.
This bot triages issues according to the following rules:
lifecycle/stale
is appliedlifecycle/stale
was applied, lifecycle/rotten
is appliedlifecycle/rotten
was applied, the issue is closedYou can:
/reopen
/remove-lifecycle rotten
Please send feedback to sig-contributor-experience at kubernetes/community.
/close not-planned
@k8s-triage-robot: Closing this issue, marking it as "Not Planned".
Is your feature request related to a problem?
Install Pre Reqs Docs are too vague about VPC tagging requirement.
If the docs were improved the following related issue (https://github.com/kubernetes-sigs/aws-load-balancer-controller/issues/2812 ) might not exist.
What it looks like today:
https://kubernetes-sigs.github.io/aws-load-balancer-controller/v2.4/deploy/installation/#deployment-considerations
Deployment Considerations¶ Additional Requirements for non-EKS clusters:¶ Ensure subnets are tagged appropriately for auto-discovery to work For IP targets, pods must have IPs from the VPC subnets. You can configure amazon-vpc-cni-k8s plugin for this purpose.
Describe the solution you'd like "Deployment Considerations" info should be moved to "Network Configuration" (it's definitely a network config issue, and because it's in the wrong spot it's easy to miss)
Also elaborate on it as the following vague statement isn't remotely useful: "Ensure subnets are tagged appropriately for auto-discovery to work.".
At bare minimum reference this https://aws.amazon.com/premiumsupport/knowledge-center/eks-load-balancer-controller-subnets/ consider pointing out an example snippet of how VPC should be tagged: https://github.com/terraform-aws-modules/terraform-aws-eks/blob/d7016cf39d25245eb0c2992971d711fbe8ddf71e/examples/complete/main.tf#L418-L424
Describe alternatives you've considered Not sure if this is a bug or a feature request