This message was deleted.
# k3s
a
This message was deleted.
c
no, that should work fine. You might consider running the server agentless so you don’t have to worry about backhauling CNI traffic to your cloud provider… unless you do want it to run core cluster services like dns and such.
r
Thanks, yes I did read that, I suspect my local proof of concept worked without the wireguard setting because I had the k3 server running in a digital ocean VPS but 2 worker nodes on my local network where they could communicate with each other. I did have the server running agentless already. Do you know if the official docker rancher/k3s images support wireguard or are there are addition steps required to get that working? I feel like I tried at some point and it didnt work out but didnt spend too much time on it.
Just following up here in case anybody comes across this thread. Running a k3s cluster in my companies normal k8s cluster as pod didnt end up working because as far as I've been told there isnt a way to guarantee a pod always gets assigned a true public static IP address that the server needs to setup a wireguard backend, needs to be started with the external IP set correctly as far as I know. The rancher/k3 image does support wireguard but I didnt have a way to know what its public ip address would be all the time if ever.