Skip to content

Commit f99f10b

Browse files
joestringerqmonnet
authored andcommitted
docs: Deprecate support for podnetwork etcd
Running Etcd in podnetwork to distribute state between Cilium instances introduces a range of challenges to bootstrapping and ensuring reliable connectivity within the cluster. We've deprecated in-built support in the Helm charts for this sort of configuration for several releases, and documented suggested alternatives. If we deprecate this feature then we can simplify some of the operations inside the cilium-agent. For alternative installation steps, see https://docs.cilium.io/en/stable/installation/k8s-install-external-etcd/#admin-install-daemonset . Signed-off-by: Joe Stringer <[email protected]>
1 parent e9d8122 commit f99f10b

1 file changed

Lines changed: 5 additions & 0 deletions

File tree

Documentation/operations/upgrade.rst

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -358,6 +358,11 @@ Annotations:
358358
* Certain invalid CiliumNetworkPolicies that have always been ignored will now be rejected by the apiserver.
359359
Specifically, policies with multiple L7 protocols on the same port, over 40 port rules, or over
360360
40 ICMP rules will now have server-side validation.
361+
* Cilium could previously be run in a configuration where the Etcd instances
362+
that distribute Cilium state between nodes would be managed in pod network by
363+
Cilium itself. This support was complicated and error prone, so the support
364+
is now deprecated. The following guide provides alternatives for running
365+
Cilium with Etcd: :ref:`k8s_install_etcd`.
361366

362367
Removed Options
363368
~~~~~~~~~~~~~~~

0 commit comments

Comments
 (0)