-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
WSL2: Network Policies still not working correctly in v0.25.0 #3789
Comments
cc @aojea [Antonio and I are at KubeCon this week] Just to clarify: this is with the defaults for |
@BenTheElder yes just with |
can you please do a if is an environment related thing and with WSL, it may be possible you. miss some kernel modules |
@aojea sure here you go I know it can be a bit of a pain with WSL2, as to even get Cilium to work correctly requires quite a bit of effort - which is why I've stuck with Calico for now |
yeah, you need to have nfqueue support in the kernel for this feature
see for reference https://www.reddit.com/r/bashonubuntuonwindows/comments/vrldwj/problems_with_nfqueue_on_wsl/ I think the module name is |
@aojea thanks for this, I'll take a look! |
We may need to update the WSL2 guide to handle ensuring these modules, pending confirmation |
I'm not sure how you want to handle this issue now to be honest - but I've decided to just stick with Calico for now, as I'm not keen on messing around with the kernel just to get things like this working. It feels like too much hassle 😅 |
In the past just running any sort of Kubernetes on WSL2 required a patched kernel due to missing core functionality. Today I think you just need some kernel modules loaded. These are for the same tech (nftables) that will be the default in kube-proxy upstream in the future so we need to address that anyhow. |
What happened:
I noticed that #3713 has now been closed - but when I apply a
deny
network policy, it's still not being applied. Is this the same for anyone else?What you expected to happen:
A
deny
network policy to take effect when usingkind create cluster
How to reproduce it (as minimally and precisely as possible):
Apply network policy with
k apply -f https://github.com/thepaulmacca/cks-course-environment/raw/refs/heads/master/course-content/cluster-setup/network-policies/default-deny/default-deny-allow-dns.yaml
Create pods to test
Anything else we need to know?:
Using WSL2 on Windows 11
Output of
wsl --version
This works fine with Calico installed, so have to stick with that for the moment
Environment:
kind version
):kind v0.25.0 go1.23.1 linux/amd64
docker info
,podman info
ornerdctl info
):/etc/os-release
):kubectl version
):The text was updated successfully, but these errors were encountered: