Link Search Menu Expand Document

FAQ 1: Unexplained disconnections using an egress service

When using an egress service with an external node, unexplained session disconnections are observed

“Egress service” is an AdvantEDGE feature used to include external edge nodes into a scenario. On certain systems, configuring & using an egress service will present unexplained spurious disconnections.

This condition may be related to the segmentation offload that certain network cards may offer. Segmentation offload comes in different flavors Large Send Offload (LSO), TSO (the TCP flavor) or GSO (generic flavor)

This problem may be related to specific hardware and/or hardware / driver combination and has been observed on NICs using kernel driver & modules e1000e such as the example shown below.

lspci | awk '/[Nn]et/ {print $1}' | xargs -i% lspci -ks %
00:1f.6 Ethernet controller: Intel Corporation Ethernet Connection (5) I219-LM
       Subsystem: Dell Ethernet Connection (5) I219-LM
       Kernel driver in use: e1000e
       Kernel modules: e1000e

To temporarily disable segmentation offload:

# xxx is the device name (eth0, eno1... etc)
ethtool -K xxx gso off gro off tso off

To permanently disable segmentation offload, modify the interface configuration file (/etc/network/interfaces) as shown below:

iface eno1 inet static
address xx.xx.xx.xx
netmask xx.xx.xx.xx
gateway xx.xx.xx.xx
broadcast xx.xx.xx.xx
dns-nameservers xx.xx.xx.xx
post-up /sbin/ethtool -K eno1 gso off gro off tso off

This problem has been observed as far as 2010.

Related resources:


FAQ 2: K8s Docker container runtime deprecation

Starting with k8s version 1.22, Docker container runtime is no longer supported

With release 1.20, Kubernetes announced that it was deprecating Docker as a container runtime, promoting instead other runtimes that support the Container Runtime Interface (CRI), such as containerd and CRI-O. As of release 1.22, Docker container runtime is officially unsupported by k8s.

Why deprecate Docker container runtime?

To support interoperability with different container runtimes, Kubernetes requires a runtime that implements the Container Runtime Interface (CRI). Docker container runtime is not CRI-compliant and requires an adaptation layer called dockershim, maintained by k8s. As of release 1.22, k8s decided to stop maintaining dockershim for Docker, in favor of other CRI-compatible runtimes.

More details about the deprecation can be found here:

Impact on AdvantEDGE deployment

Support for k8s versions 1.22+ was added with AdvantEDGE release v1.9.0. In this release, the Docker container runtime was replaced by the CRI-compliant containerd container runtime. The AdvantEDGE runtime installation procedure has been updated to initialize k8s with containerd as the default container runtime.