Replies: 1 comment 2 replies
-
This sounds like it'd be an issue on any host running containers, not just K3s. Does connman not include a sensible default blocklist that ignores common virtual interface patterns?
I don't think it is appropriate for K3s to drop configuration for other packages, so this is not likely something we would do. |
Beta Was this translation helpful? Give feedback.
2 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Hi,
Just came across an issue installing k3s on debian bookworm with LXQT - LXQT recommends connman not network manager, and connman attempts to connect over all the veth* devices created for pods. It creates default routes down each of these interfaces which breaks routing for the host.
You can tell connman to ignore interfaces -see https://wiki.archlinux.org/title/ConnMan#Blacklist_interfaces, so I'm thinking the k3s install could amend connman config to ignore veth* interfaces if it detects connman is installed. Does that seem sensible?
If that makes sense I will see if I can work up a PR for it...
Beta Was this translation helpful? Give feedback.
All reactions