This message was deleted.
# k3s
a
This message was deleted.
c
K3s has always used a tunnel between the agents and apiservers so that the server does not have to open connections back to the kubelet port on the agents. Previously that was done via a patch to the kubelet code, and couldn’t be disabled. Now it’s done differently, and can be disabled.
🎯 1
l
Wonderful … so we can keep on going in the direction that we start … by using
--egress-controller-mode=disabled
- it shouldn’t make any difference at all on newer K3s versions. Thank you!
c
The default (agent) mode is optimal as it allows you to avoid having to expose more ports on your agents. There was an issue with the egress proxy code that caused occasional errors, that will be fixed in our next release cycle.
l
Okay we’ll switch back then. Want optimal all the way. Haven’t had to open up any extra ports after setting the egress to disabled though. I guess that might say something about how open communication is between nodes in the cluster
c
yeah if they already have all the ports open to each other it probably matters less
l
Oh yeah. So this would be an issue if it’s a tightly regulated / hardened environment. The tunneling feature here is indeed nice.
303 Views