Hi all, i was trying to use Cloud NAT to get a stable egress IP for the outbound connections from my pods.
The cluster is not a private cluster but a standard cluster on the default VPC network but from the official docs look like is possible to nat the pods traffic
Regular (non-private) GKE clusters assign each node an external IP address, so such clusters cannot use Cloud NAT to send packets from the node’s primary interface. Pods can still use Cloud NAT if they send packets with source IP addresses set to the pod IP. ( https://cloud.google.com/nat/docs/overview )
So i gave it a try but the pod egress traffic is not captured by Cloud NAT.
I was thinking that maybe this happend because k8s masquerade the pod ips by default. So i was thinking to enable the network policy on k8s then add a custom masquerade policy to disable the masquerading on the pod net ips:
In not sure that this will work, any advice or alternative idea to get a stable ip for egress connections?
Kubernetes version: 1.11.8-gke.6
Cloud being used: GKE
CNI and version:
CRI and version:
You can format your yaml by highlighting it and pressing Ctrl-Shift-C, it will make your output easier to read.