From 5188443988c5d4a55d95a31f653655d47cbbab37 Mon Sep 17 00:00:00 2001 From: Manuel Buil Date: Mon, 21 Nov 2022 17:10:35 +0100 Subject: [PATCH] Fix log for flannelExternalIP use case Signed-off-by: Manuel Buil --- pkg/agent/run.go | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/pkg/agent/run.go b/pkg/agent/run.go index e89f1ab13b..7c4ba2112b 100644 --- a/pkg/agent/run.go +++ b/pkg/agent/run.go @@ -100,7 +100,7 @@ func run(ctx context.Context, cfg cmds.Agent, proxy proxy.Proxy) error { if !nodeConfig.NoFlannel { if (nodeConfig.FlannelExternalIP) && (len(nodeConfig.AgentConfig.NodeExternalIPs) == 0) { logrus.Warnf("Server has flannel-external-ip flag set but this node does not set node-external-ip. Flannel will use internal address when connecting to this node.") - } else if (nodeConfig.FlannelBackend != types.FlannelBackendWireguardNative) && (nodeConfig.FlannelBackend != types.FlannelBackendIPSEC) { + } else if (nodeConfig.FlannelExternalIP) && (nodeConfig.FlannelBackend != types.FlannelBackendWireguardNative) && (nodeConfig.FlannelBackend != types.FlannelBackendIPSEC) { logrus.Warnf("Flannel is using external addresses with an insecure backend: %v. Please consider using an encrypting flannel backend.", nodeConfig.FlannelBackend) } if err := flannel.Prepare(ctx, nodeConfig); err != nil {