Link Search Menu Expand Document

FAQ 1: Unexplained disconnections using an egress service

When using an egress service with an external node, unexplained session disconnections are observed

“Egress service” is an AdvantEDGE feature used to include external edge nodes into a scenario. On certain systems, configuring & using an egress service will present unexplained spurious disconnections.

This condition may be related to the segmentation offload that certain network cards may offer. Segmentation offload comes in different flavors Large Send Offload (LSO), TSO (the TCP flavor) or GSO (generic flavor)

This problem may be related to specific hardware and/or hardware / driver combination and has been observed on NICs using kernel driver & modules e1000e such as the example shown below.

lspci | awk '/[Nn]et/ {print $1}' | xargs -i% lspci -ks %
00:1f.6 Ethernet controller: Intel Corporation Ethernet Connection (5) I219-LM
       Subsystem: Dell Ethernet Connection (5) I219-LM
       Kernel driver in use: e1000e
       Kernel modules: e1000e

To temporarily disable segmentation offload:

# xxx is the device name (eth0, eno1... etc)
ethtool -K xxx gso off gro off tso off

To permanently disable segmentation offload, modify the interface configuration file (/etc/network/interfaces) as shown below:

iface eno1 inet static
address xx.xx.xx.xx
netmask xx.xx.xx.xx
gateway xx.xx.xx.xx
broadcast xx.xx.xx.xx
dns-nameservers xx.xx.xx.xx
post-up /sbin/ethtool -K eno1 gso off gro off tso off

This problem has been observed as far as 2010.

Related resources:


FAQ 2: K8s Docker container runtime deprecation

Starting with k8s version 1.22, Docker container runtime is no longer supported

With release 1.20, Kubernetes announced that it was deprecating Docker as a container runtime, promoting instead other runtimes that support the Container Runtime Interface (CRI), such as containerd and CRI-O. As of release 1.22, Docker container runtime is officially unsupported by k8s.

Why deprecate Docker container runtime?

To support interoperability with different container runtimes, Kubernetes requires a runtime that implements the Container Runtime Interface (CRI). Docker container runtime is not CRI-compliant and requires an adaptation layer called dockershim, maintained by k8s. As of release 1.22, k8s decided to stop maintaining dockershim for Docker, in favor of other CRI-compatible runtimes.

More details about the deprecation can be found here:

Impact on AdvantEDGE deployment

AdvantEDGE runtime installation procedure deploys Docker as the k8s container runtime. For this reason, AdvantEDGE installation as currently documented only supports k8s versions up to 1.21. We have validated that the Docker container runtime can be replaced seamlessly by containerd for k8s version 1.20, however we have not yet tested with the latest k8s release 1.22.

We will update the AdvantEDGE documentation with the new container runtime installation procedure as soon as we officially support the latest k8s version. Users wishing to migrate to another CRI-compatible container runtime may do so at any time.