virtualbox: change default `host-only-cidr`
We change the default `--host-only-cidr` to `192.168.59.1/24` in order to be compatible with the new default host-only networking restrictions implemented in VirtualBox 6.1.28. This fixes access denied errors on `minikube start` when using VirtualBox >= 6.1.28: ``` VBoxManage: error: Code E_ACCESSDENIED (0x80070005) - Access denied (extended info not available) VBoxManage: error: Context: "EnableStaticIPConfig(Bstr(pszIp).raw(), Bstr(pszNetmask).raw())" at line 242 of file VBoxManageHostonly.cpp ``` More details: VirtualBox 6.1.28 introduced new restrictions on host-only networking: https://www.virtualbox.org/wiki/Changelog-6.1#v28 Manual: https://www.virtualbox.org/manual/ch06.html#network_hostonly > On Linux, Mac OS X and Solaris Oracle VM VirtualBox will only allow IP > addresses in 192.68.56.0/21 range to be assigned to host-only > adapters. For IPv6 only link-local addresses are allowed. If other > ranges are desired, they can be enabled by creating > /etc/vbox/networks.conf and specifying allowed ranges there. For > example, to allow 10.0.0.0/8 and 192.168.0.0/16 IPv4 ranges as well as > 2001::/64 range put the following lines into /etc/vbox/networks.conf: > > * 10.0.0.0/8 192.168.0.0/16 > * 2001::/64 > > Lines starting with the hash # are ignored. Next example allows any > addresses, effectively disabling range control: > > * 0.0.0.0/0 ::/0 These new restrictions manifest in the form of the following issue on `minikube start` due to the default `--host-only-cidr` used by the VirtualBox driver being `192.168.99.1/24`: ```console 😄 minikube v1.23.2 on Ubuntu 18.04 ✨ Using the virtualbox driver based on user configuration 👍 Starting control plane node minikube in cluster minikube 🔥 Creating virtualbox VM (CPUs=2, Memory=6000MB, Disk=20000MB) ... 🔥 Deleting "minikube" in virtualbox ... 🤦 StartHost failed, but will try again: creating host: create: creating: Error setting up host only network on machine start: /usr/bin/VBoxManage hostonlyif ipconfig vboxnet0 --ip 192.168.99.1 --netmask 255.255.255.0 failed: VBoxManage: error: Code E_ACCESSDENIED (0x80070005) - Access denied (extended info not available) VBoxManage: error: Context: "EnableStaticIPConfig(Bstr(pszIp).raw(), Bstr(pszNetmask).raw())" at line 242 of file VBoxManageHostonly.cpp 🔥 Creating virtualbox VM (CPUs=2, Memory=6000MB, Disk=20000MB) ... 😿 Failed to start virtualbox VM. Running "minikube delete" may fix it: creating host: create: creating: Error setting up host only network on machine start: /usr/bin/VBoxManage hostonlyif ipconfig vboxnet1 --ip 192.168.99.1 --netmask 255.255.255.0 failed: VBoxManage: error: Code E_ACCESSDENIED (0x80070005) - Access denied (extended info not available) VBoxManage: error: Context: "EnableStaticIPConfig(Bstr(pszIp).raw(), Bstr(pszNetmask).raw())" at line 242 of file VBoxManageHostonly.cpp ❌ Exiting due to GUEST_PROVISION: Failed to start host: creating host: create: creating: Error setting up host only network on machine start: /usr/bin/VBoxManage hostonlyif ipconfig vboxnet1 --ip 192.168.99.1 --netmask 255.255.255.0 failed: VBoxManage: error: Code E_ACCESSDENIED (0x80070005) - Access denied (extended info not available) VBoxManage: error: Context: "EnableStaticIPConfig(Bstr(pszIp).raw(), Bstr(pszNetmask).raw())" at line 242 of file VBoxManageHostonly.cpp ╭───────────────────────────────────────────────────────────────────────────────────────────╮ │ │ │ 😿 If the above advice does not help, please let us know: │ │ 👉 https://github.com/kubernetes/minikube/issues/new/choose │ │ │ │ Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │ │ │ ╰───────────────────────────────────────────────────────────────────────────────────────────╯ ``` While the above is the primary error, other errors will be reported if the adapter already exists (this happens when the adapter was created before updating to VirtualBox 6.1.28, on a version of VirtualBox without the new restrictions). Some examples: ``` ❌ Exiting due to IF_VBOX_NOT_VISIBLE: Failed to start host: creating host: create: creating: Error setting up host only network on machine start: The host-only adapter we just created is not visible. This is a well known VirtualBox bug. You might want to uninstall it and reinstall at least version 5.0.12 that is is supposed to fix this issue ``` ``` ❌ minikube is unable to connect to the VM: dial tcp 192.168.99.112:22: i/o timeout This is likely due to one of two reasons: - VPN or firewall interference - virtualbox network configuration issue Suggested workarounds: - Disable your local VPN or firewall software - Configure your local VPN or firewall to allow access to 192.168.99.112 - Restart or reinstall virtualbox - Use an alternative --vm-driver - Use --force to override this connectivity check ❌ Exiting due to GUEST_PROVISION: Failed to validate network: dial tcp 192.168.99.112:22: i/o timeout ``` When switching to a valid CIDR, `minikube start` works as usual: ```console 😄 minikube v1.23.2 on Ubuntu 18.04 ✨ Using the virtualbox driver based on user configuration 👍 Starting control plane node minikube in cluster minikube 🔥 Creating virtualbox VM (CPUs=2, Memory=6000MB, Disk=20000MB) ... 🐳 Preparing Kubernetes v1.22.2 on Docker 20.10.8 ... ▪ Generating certificates and keys ... ▪ Booting up control plane ... ▪ Configuring RBAC rules ... ▪ Using image gcr.io/k8s-minikube/storage-provisioner:v5 🔎 Verifying Kubernetes components... 🌟 Enabled addons: storage-provisioner, default-storageclass 🏄 Done! kubectl is now configured to use "minikube" cluster and "default" namespace by default ``` Signed-off-by: Nicolas Busseneau <nicolas@isovalent.com>pull/12811/head
parent
1b3d18d2fd
commit
02a43c52e2
|
@ -205,7 +205,7 @@ func initDriverFlags() {
|
|||
startCmd.Flags().Int(kvmNUMACount, 1, "Simulate numa node count in minikube, supported numa node count range is 1-8 (kvm2 driver only)")
|
||||
|
||||
// virtualbox
|
||||
startCmd.Flags().String(hostOnlyCIDR, "192.168.99.1/24", "The CIDR to be used for the minikube VM (virtualbox driver only)")
|
||||
startCmd.Flags().String(hostOnlyCIDR, "192.168.59.1/24", "The CIDR to be used for the minikube VM (virtualbox driver only)")
|
||||
startCmd.Flags().Bool(dnsProxy, false, "Enable proxy for NAT DNS requests (virtualbox driver only)")
|
||||
startCmd.Flags().Bool(hostDNSResolver, true, "Enable host resolver for NAT DNS requests (virtualbox driver only)")
|
||||
startCmd.Flags().Bool(noVTXCheck, false, "Disable checking for the availability of hardware virtualization before the vm is started (virtualbox driver only)")
|
||||
|
|
|
@ -280,7 +280,7 @@ func TestGetPrimaryControlPlane(t *testing.T) {
|
|||
expectedName string
|
||||
}{
|
||||
{"old style", "p1", "192.168.64.75", 8443, "minikube"},
|
||||
{"new style", "p2_newformat", "192.168.99.136", 8443, "m01"},
|
||||
{"new style", "p2_newformat", "192.168.59.136", 8443, "m01"},
|
||||
}
|
||||
|
||||
for _, tc := range tests {
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"DockerEnv": null,
|
||||
"InsecureRegistry": null,
|
||||
"RegistryMirror": null,
|
||||
"HostOnlyCIDR": "192.168.99.1/24",
|
||||
"HostOnlyCIDR": "192.168.59.1/24",
|
||||
"HypervVirtualSwitch": "",
|
||||
"KVMNetwork": "default",
|
||||
"KVMQemuURI": "qemu:///system",
|
||||
|
@ -47,4 +47,4 @@
|
|||
"ShouldLoadCachedImages": true,
|
||||
"EnableDefaultCNI": false
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
@ -12,7 +12,7 @@
|
|||
"DockerEnv": null,
|
||||
"InsecureRegistry": null,
|
||||
"RegistryMirror": null,
|
||||
"HostOnlyCIDR": "192.168.99.1/24",
|
||||
"HostOnlyCIDR": "192.168.59.1/24",
|
||||
"HypervVirtualSwitch": "",
|
||||
"KVMNetwork": "default",
|
||||
"KVMQemuURI": "qemu:///system",
|
||||
|
@ -46,11 +46,11 @@
|
|||
"Nodes": [
|
||||
{
|
||||
"Name": "m01",
|
||||
"IP": "192.168.99.136",
|
||||
"IP": "192.168.59.136",
|
||||
"Port": 8443,
|
||||
"KubernetesVersion": "v1.15.0",
|
||||
"ControlPlane": true,
|
||||
"Worker": true
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
|
|
|
@ -12,7 +12,7 @@
|
|||
"DockerEnv": null,
|
||||
"InsecureRegistry": null,
|
||||
"RegistryMirror": null,
|
||||
"HostOnlyCIDR": "192.168.99.1/24",
|
||||
"HostOnlyCIDR": "192.168.59.1/24",
|
||||
"HypervVirtualSwitch": "",
|
||||
"KVMNetwork": "default",
|
||||
"KVMQemuURI": "qemu:///system",
|
||||
|
@ -44,4 +44,4 @@
|
|||
"ShouldLoadCachedImages": true,
|
||||
"EnableDefaultCNI": false
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
@ -12,7 +12,7 @@
|
|||
"DockerEnv": null,
|
||||
"InsecureRegistry": null,
|
||||
"RegistryMirror": null,
|
||||
"HostOnlyCIDR": "192.168.99.1/24",
|
||||
"HostOnlyCIDR": "192.168.59.1/24",
|
||||
"HypervVirtualSwitch": "",
|
||||
"KVMNetwork": "default",
|
||||
"KVMQemuURI": "qemu:///system",
|
||||
|
@ -46,4 +46,4 @@
|
|||
"ShouldLoadCachedImages": true,
|
||||
"EnableDefaultCNI": false
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
@ -12,7 +12,7 @@
|
|||
"DockerEnv": null,
|
||||
"InsecureRegistry": null,
|
||||
"RegistryMirror": null,
|
||||
"HostOnlyCIDR": "192.168.99.1/24",
|
||||
"HostOnlyCIDR": "192.168.59.1/24",
|
||||
"HypervVirtualSwitch": "",
|
||||
"KVMNetwork": "default",
|
||||
"KVMQemuURI": "qemu:///system",
|
||||
|
@ -44,4 +44,4 @@
|
|||
"ShouldLoadCachedImages": true,
|
||||
"EnableDefaultCNI": false
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
@ -12,7 +12,7 @@
|
|||
"DockerEnv": null,
|
||||
"InsecureRegistry": null,
|
||||
"RegistryMirror": null,
|
||||
"HostOnlyCIDR": "192.168.99.1/24",
|
||||
"HostOnlyCIDR": "192.168.59.1/24",
|
||||
"HypervVirtualSwitch": "",
|
||||
"KVMNetwork": "default",
|
||||
"KVMQemuURI": "qemu:///system",
|
||||
|
@ -46,4 +46,4 @@
|
|||
"ShouldLoadCachedImages": true,
|
||||
"EnableDefaultCNI": false
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
@ -12,7 +12,7 @@
|
|||
"DockerEnv": null,
|
||||
"InsecureRegistry": null,
|
||||
"RegistryMirror": null,
|
||||
"HostOnlyCIDR": "192.168.99.1/24",
|
||||
"HostOnlyCIDR": "192.168.59.1/24",
|
||||
"HypervVirtualSwitch": "",
|
||||
"KVMNetwork": "default",
|
||||
"KVMQemuURI": "qemu:///system",
|
||||
|
@ -46,4 +46,4 @@
|
|||
"ShouldLoadCachedImages": true,
|
||||
"EnableDefaultCNI": false
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
@ -12,7 +12,7 @@
|
|||
"DockerEnv": null,
|
||||
"InsecureRegistry": null,
|
||||
"RegistryMirror": null,
|
||||
"HostOnlyCIDR": "192.168.99.1/24",
|
||||
"HostOnlyCIDR": "192.168.59.1/24",
|
||||
"HypervVirtualSwitch": "",
|
||||
"KVMNetwork": "default",
|
||||
"KVMQemuURI": "qemu:///system",
|
||||
|
@ -46,4 +46,4 @@
|
|||
"ShouldLoadCachedImages": true,
|
||||
"EnableDefaultCNI": false
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
@ -12,7 +12,7 @@
|
|||
"DockerEnv": null,
|
||||
"InsecureRegistry": null,
|
||||
"RegistryMirror": null,
|
||||
"HostOnlyCIDR": "192.168.99.1/24",
|
||||
"HostOnlyCIDR": "192.168.59.1/24",
|
||||
"HypervVirtualSwitch": "",
|
||||
"KVMNetwork": "default",
|
||||
"KVMQemuURI": "qemu:///system",
|
||||
|
|
|
@ -12,7 +12,7 @@
|
|||
"DockerEnv": null,
|
||||
"InsecureRegistry": null,
|
||||
"RegistryMirror": null,
|
||||
"HostOnlyCIDR": "192.168.99.1/24",
|
||||
"HostOnlyCIDR": "192.168.59.1/24",
|
||||
"HypervVirtualSwitch": "",
|
||||
"KVMNetwork": "default",
|
||||
"KVMQemuURI": "qemu:///system",
|
||||
|
@ -46,4 +46,4 @@
|
|||
"ShouldLoadCachedImages": true,
|
||||
"EnableDefaultCNI": false
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
@ -12,7 +12,7 @@
|
|||
"DockerEnv": null,
|
||||
"InsecureRegistry": null,
|
||||
"RegistryMirror": null,
|
||||
"HostOnlyCIDR": "192.168.99.1/24",
|
||||
"HostOnlyCIDR": "192.168.59.1/24",
|
||||
"HypervVirtualSwitch": "",
|
||||
"KVMNetwork": "default",
|
||||
"KVMQemuURI": "qemu:///system",
|
||||
|
@ -44,4 +44,4 @@
|
|||
"ShouldLoadCachedImages": true,
|
||||
"EnableDefaultCNI": false
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
@ -12,7 +12,7 @@
|
|||
"DockerEnv": null,
|
||||
"InsecureRegistry": null,
|
||||
"RegistryMirror": null,
|
||||
"HostOnlyCIDR": "192.168.99.1/24",
|
||||
"HostOnlyCIDR": "192.168.59.1/24",
|
||||
"HypervVirtualSwitch": "",
|
||||
"KVMNetwork": "default",
|
||||
"KVMQemuURI": "qemu:///system",
|
||||
|
@ -46,4 +46,4 @@
|
|||
"ShouldLoadCachedImages": true,
|
||||
"EnableDefaultCNI": false
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
@ -12,7 +12,7 @@
|
|||
"DockerEnv": null,
|
||||
"InsecureRegistry": null,
|
||||
"RegistryMirror": null,
|
||||
"HostOnlyCIDR": "192.168.99.1/24",
|
||||
"HostOnlyCIDR": "192.168.59.1/24",
|
||||
"HypervVirtualSwitch": "",
|
||||
"KVMNetwork": "default",
|
||||
"KVMQemuURI": "qemu:///system",
|
||||
|
@ -46,4 +46,4 @@
|
|||
"ShouldLoadCachedImages": true,
|
||||
"EnableDefaultCNI": false
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
@ -12,7 +12,7 @@
|
|||
"DockerEnv": null,
|
||||
"InsecureRegistry": null,
|
||||
"RegistryMirror": null,
|
||||
"HostOnlyCIDR": "192.168.99.1/24",
|
||||
"HostOnlyCIDR": "192.168.59.1/24",
|
||||
"HypervVirtualSwitch": "",
|
||||
"KVMNetwork": "default",
|
||||
"KVMQemuURI": "qemu:///system",
|
||||
|
@ -46,4 +46,4 @@
|
|||
"ShouldLoadCachedImages": true,
|
||||
"EnableDefaultCNI": false
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
@ -12,7 +12,7 @@
|
|||
"DockerEnv": null,
|
||||
"InsecureRegistry": null,
|
||||
"RegistryMirror": null,
|
||||
"HostOnlyCIDR": "192.168.99.1/24",
|
||||
"HostOnlyCIDR": "192.168.59.1/24",
|
||||
"HypervVirtualSwitch": "",
|
||||
"KVMNetwork": "default",
|
||||
"KVMQemuURI": "qemu:///system",
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"DockerEnv": null,
|
||||
"InsecureRegistry": null,
|
||||
"RegistryMirror": null,
|
||||
"HostOnlyCIDR": "192.168.99.1/24",
|
||||
"HostOnlyCIDR": "192.168.59.1/24",
|
||||
"HypervVirtualSwitch": "",
|
||||
"KVMNetwork": "default",
|
||||
"KVMQemuURI": "qemu:///system",
|
||||
|
@ -46,4 +46,4 @@
|
|||
"ShouldLoadCachedImages": true,
|
||||
"EnableDefaultCNI": false
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
@ -12,7 +12,7 @@
|
|||
"DockerEnv": null,
|
||||
"InsecureRegistry": null,
|
||||
"RegistryMirror": null,
|
||||
"HostOnlyCIDR": "192.168.99.1/24",
|
||||
"HostOnlyCIDR": "192.168.59.1/24",
|
||||
"HypervVirtualSwitch": "",
|
||||
"KVMNetwork": "default",
|
||||
"KVMQemuURI": "qemu:///system",
|
||||
|
@ -45,11 +45,11 @@
|
|||
"Nodes": [
|
||||
{
|
||||
"Name": "m01",
|
||||
"IP": "192.168.99.136",
|
||||
"IP": "192.168.59.136",
|
||||
"Port": 8443,
|
||||
"KubernetesVersion": "v1.15.0",
|
||||
"ControlPlane": true,
|
||||
"Worker": true
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
|
|
|
@ -11,7 +11,7 @@
|
|||
"DockerEnv": null,
|
||||
"InsecureRegistry": null,
|
||||
"RegistryMirror": null,
|
||||
"HostOnlyCIDR": "192.168.99.1/24",
|
||||
"HostOnlyCIDR": "192.168.59.1/24",
|
||||
"HypervVirtualSwitch": "",
|
||||
"KVMNetwork": "default",
|
||||
"KVMQemuURI": "qemu:///system",
|
||||
|
@ -42,4 +42,4 @@
|
|||
"ShouldLoadCachedImages": true,
|
||||
"EnableDefaultCNI": false
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
@ -559,7 +559,7 @@ func minikubeConfig(config *api.Config) {
|
|||
// cluster
|
||||
clusterName := "minikube"
|
||||
cluster := api.NewCluster()
|
||||
cluster.Server = "https://192.168.99.100:" + strconv.Itoa(constants.APIServerPort)
|
||||
cluster.Server = "https://192.168.59.100:" + strconv.Itoa(constants.APIServerPort)
|
||||
cluster.CertificateAuthority = "/home/tux/.minikube/apiserver.crt"
|
||||
config.Clusters[clusterName] = cluster
|
||||
|
||||
|
|
|
@ -32,7 +32,7 @@ import (
|
|||
|
||||
const vboxConfig = `
|
||||
{
|
||||
"IPAddress": "192.168.99.101",
|
||||
"IPAddress": "192.168.59.101",
|
||||
"MachineName": "minikube",
|
||||
"SSHUser": "docker",
|
||||
"SSHPort": 33627,
|
||||
|
@ -50,7 +50,7 @@ const vboxConfig = `
|
|||
"Boot2DockerURL": "file:///home/sundarp/.minikube/cache/iso/minikube-v1.0.6.iso",
|
||||
"Boot2DockerImportVM": "",
|
||||
"HostDNSResolver": false,
|
||||
"HostOnlyCIDR": "192.168.99.1/24",
|
||||
"HostOnlyCIDR": "192.168.59.1/24",
|
||||
"HostOnlyNicType": "82540EM",
|
||||
"HostOnlyPromiscMode": "deny",
|
||||
"UIType": "headless",
|
||||
|
|
|
@ -364,9 +364,9 @@ func TestOptionallyHttpsFormattedUrlString(t *testing.T) {
|
|||
}{
|
||||
{
|
||||
description: "no https for http schemed with no https option",
|
||||
bareURLString: "http://192.168.99.100:30563",
|
||||
bareURLString: "http://192.168.59.100:30563",
|
||||
https: false,
|
||||
expectedHTTPSFormattedURLString: "http://192.168.99.100:30563",
|
||||
expectedHTTPSFormattedURLString: "http://192.168.59.100:30563",
|
||||
expectedIsHTTPSchemedURL: true,
|
||||
},
|
||||
{
|
||||
|
@ -378,9 +378,9 @@ func TestOptionallyHttpsFormattedUrlString(t *testing.T) {
|
|||
},
|
||||
{
|
||||
description: "https for http schemed with https option",
|
||||
bareURLString: "http://192.168.99.100:30563",
|
||||
bareURLString: "http://192.168.59.100:30563",
|
||||
https: true,
|
||||
expectedHTTPSFormattedURLString: "https://192.168.99.100:30563",
|
||||
expectedHTTPSFormattedURLString: "https://192.168.59.100:30563",
|
||||
expectedIsHTTPSchemedURL: true,
|
||||
},
|
||||
{
|
||||
|
@ -568,7 +568,7 @@ func TestGetCoreClient(t *testing.T) {
|
|||
mockK8sConfig := `apiVersion: v1
|
||||
clusters:
|
||||
- cluster:
|
||||
server: https://192.168.99.102:8443
|
||||
server: https://192.168.59.102:8443
|
||||
name: minikube
|
||||
contexts:
|
||||
- context:
|
||||
|
|
|
@ -119,18 +119,18 @@ Network Destination Netmask Gateway Interface Metric
|
|||
192.168.56.0 255.255.255.0 On-link 192.168.56.1 281
|
||||
192.168.56.1 255.255.255.255 On-link 192.168.56.1 281
|
||||
192.168.56.255 255.255.255.255 On-link 192.168.56.1 281
|
||||
192.168.99.0 255.255.255.0 On-link 192.168.99.1 281
|
||||
192.168.99.1 255.255.255.255 On-link 192.168.99.1 281
|
||||
192.168.59.0 255.255.255.0 On-link 192.168.59.1 281
|
||||
192.168.59.1 255.255.255.255 On-link 192.168.59.1 281
|
||||
10.211.55.0 255.255.255.0 192.168.1.2 10.211.55.3 281
|
||||
192.168.99.255 255.255.255.255 On-link 192.168.99.1 281
|
||||
192.168.59.255 255.255.255.255 On-link 192.168.59.1 281
|
||||
224.0.0.0 240.0.0.0 On-link 127.0.0.1 331
|
||||
224.0.0.0 240.0.0.0 On-link 10.211.55.3 281
|
||||
224.0.0.0 240.0.0.0 On-link 192.168.56.1 281
|
||||
224.0.0.0 240.0.0.0 On-link 192.168.99.1 281
|
||||
224.0.0.0 240.0.0.0 On-link 192.168.59.1 281
|
||||
255.255.255.255 255.255.255.255 On-link 127.0.0.1 331
|
||||
255.255.255.255 255.255.255.255 On-link 10.211.55.3 281
|
||||
255.255.255.255 255.255.255.255 On-link 192.168.56.1 281
|
||||
255.255.255.255 255.255.255.255 On-link 192.168.99.1 281
|
||||
255.255.255.255 255.255.255.255 On-link 192.168.59.1 281
|
||||
===========================================================================
|
||||
Persistent Routes:
|
||||
None`
|
||||
|
|
|
@ -94,7 +94,7 @@ func TestGenerateSignedCert(t *testing.T) {
|
|||
certPath := filepath.Join(tmpDir, "cert")
|
||||
keyPath := filepath.Join(tmpDir, "key")
|
||||
|
||||
ips := []net.IP{net.ParseIP("192.168.99.100"), net.ParseIP("10.0.0.10")}
|
||||
ips := []net.IP{net.ParseIP("192.168.59.100"), net.ParseIP("10.0.0.10")}
|
||||
alternateDNS := []string{"kubernetes.default.svc.cluster.local", "kubernetes.default"}
|
||||
|
||||
var tests = []struct {
|
||||
|
|
|
@ -54,7 +54,7 @@ minikube start [flags]
|
|||
--force Force minikube to perform possibly dangerous operations
|
||||
--force-systemd If set, force the container runtime to use systemd as cgroup manager. Defaults to false.
|
||||
--host-dns-resolver Enable host resolver for NAT DNS requests (virtualbox driver only) (default true)
|
||||
--host-only-cidr string The CIDR to be used for the minikube VM (virtualbox driver only) (default "192.168.99.1/24")
|
||||
--host-only-cidr string The CIDR to be used for the minikube VM (virtualbox driver only) (default "192.168.59.1/24")
|
||||
--host-only-nic-type string NIC Type used for host only network. One of Am79C970A, Am79C973, 82540EM, 82543GC, 82545EM, or virtio (virtualbox driver only) (default "virtio")
|
||||
--hyperkit-vpnkit-sock string Location of the VPNKit socket used for networking. If empty, disables Hyperkit VPNKitSock, if 'auto' uses Docker for Mac VPNKit connection, otherwise uses the specified VSock (hyperkit driver only)
|
||||
--hyperkit-vsock-ports strings List of guest VSock ports that should be exposed as sockets on the host (hyperkit driver only)
|
||||
|
|
|
@ -15,7 +15,8 @@ VirtualBox is minikube's original driver. It may not provide the fastest start-u
|
|||
|
||||
minikube start supports some VirtualBox specific flags:
|
||||
|
||||
* **`--host-only-cidr`**: The CIDR to be used for the minikube VM (default "192.168.99.1/24")
|
||||
* **`--host-only-cidr`**: The CIDR to be used for the minikube VM (default "192.168.59.1/24")
|
||||
* On Linux, Mac OS X and Oracle Solaris with VirtualBox >= 6.1.28, [only IP addresses in the 192.68.56.0/21 range are allowed for host-only networking by default](https://www.virtualbox.org/manual/ch06.html#network_hostonly). Passing a disallowed value to `--host-only-cidr` will result in a VirtualBox access denied error: `VBoxManage: error: Code E_ACCESSDENIED (0x80070005) - Access denied (extended info not available)`.
|
||||
* **`--no-vtx-check`**: Disable checking for the availability of hardware virtualization
|
||||
|
||||
## Issues
|
||||
|
|
|
@ -20,7 +20,7 @@ If a HTTP proxy is required to access the internet, you may need to pass the pro
|
|||
|
||||
The NO_PROXY variable here is important: Without setting it, minikube may not be able to access resources within the VM. minikube uses two IP ranges, which should not go through the proxy:
|
||||
|
||||
* **192.168.99.0/24**: Used by the minikube VM. Configurable for some hypervisors via `--host-only-cidr`
|
||||
* **192.168.59.0/24**: Used by the minikube VM. Configurable for some hypervisors via `--host-only-cidr`
|
||||
* **192.168.39.0/24**: Used by the minikube kvm2 driver.
|
||||
* **192.168.49.0/24**: Used by the minikube docker driver's first cluster.
|
||||
* **10.96.0.0/12**: Used by service cluster IP's. Configurable via `--service-cluster-ip-range`
|
||||
|
@ -34,7 +34,7 @@ One important note: If NO_PROXY is required by non-Kubernetes applications, such
|
|||
```shell
|
||||
export HTTP_PROXY=http://<proxy hostname:port>
|
||||
export HTTPS_PROXY=https://<proxy hostname:port>
|
||||
export NO_PROXY=localhost,127.0.0.1,10.96.0.0/12,192.168.99.0/24,192.168.39.0/24
|
||||
export NO_PROXY=localhost,127.0.0.1,10.96.0.0/12,192.168.59.0/24,192.168.39.0/24
|
||||
|
||||
minikube start
|
||||
```
|
||||
|
@ -46,7 +46,7 @@ To make the exported variables permanent, consider adding the declarations to ~/
|
|||
```shell
|
||||
set HTTP_PROXY=http://<proxy hostname:port>
|
||||
set HTTPS_PROXY=https://<proxy hostname:port>
|
||||
set NO_PROXY=localhost,127.0.0.1,10.96.0.0/12,192.168.99.0/24,192.168.39.0/24
|
||||
set NO_PROXY=localhost,127.0.0.1,10.96.0.0/12,192.168.59.0/24,192.168.39.0/24
|
||||
|
||||
minikube start
|
||||
```
|
||||
|
@ -107,7 +107,7 @@ The supplied value of `HTTPS_PROXY` is probably incorrect. Verify that this valu
|
|||
|
||||
minikube requires access from the host to the following IP ranges:
|
||||
|
||||
* **192.168.99.0/24**: Used by the minikube VM. Configurable for some hypervisors via `--host-only-cidr`
|
||||
* **192.168.59.0/24**: Used by the minikube VM. Configurable for some hypervisors via `--host-only-cidr`
|
||||
* **192.168.39.0/24**: Used by the minikube kvm2 driver.
|
||||
* **10.96.0.0/12**: Used by service cluster IP's. Configurable via `--service-cluster-ip-range`
|
||||
|
||||
|
|
Loading…
Reference in New Issue