-
Notifications
You must be signed in to change notification settings - Fork 122
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SDN-5330: Add openvswitch-ipsec package for ipsec plugin #1718
SDN-5330: Add openvswitch-ipsec package for ipsec plugin #1718
Conversation
/assign @trozet @zshi-redhat |
/retest |
Can you clarify what this package brings / why it is needed? |
To be clear, this package is inert unless the systemd service is enabled, right? Any upgrading cluster with the |
83249fb
to
5212a25
Compare
/hold |
5212a25
to
2a27e82
Compare
@travier update the PR description with more details. hope that helps. |
yes @jlebon this service would be enabled only when ipsec extension is deployed. I would be testing this with few more dependent PRs in cluster-network-operator and ovn-kubernetes, Would come back on this once we have a solid results for IPsec install/upgrade. |
CentOS builds should be available now. |
@pperiyasamy: This pull request references SDN-5330 which is a valid jira issue. Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.19.0" version, but no target version was set. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
/hold cancel The |
/assign @igsilya |
It looks like we must get this PR landed first because CI build with
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good to me. The openvswitch-ipsec service is disabled by default indeed, so shouldn't cause any issues and the OVS bump to 3.5 will be needed for other things as well, like improved handling of mixed (ipv4+ipv6) flow tables.
/retest |
The |
Signed-off-by: Periyasamy Palanisamy <[email protected]>
Currently the network operator brings up ovn-ipsec-host daemonset pod once the ipsec machine config plugin is installed on the node. The pod spins up ovs-monitor-ipsec script to create/update mesh of IPsec connections across the nodes. This makes ipsec connections to be established for the existing nodes a bit later after kubelet is started, but by the time workloads are scheduled on the node started hitting traffic drops because of unavailability of IPsec connections between nodes. This makes IPsec jobs in CI so unstable and monitor jobs always failing during IPsec upgrade. The FDP story (https://issues.redhat.com/browse/FDP-1051) gets openvswitch-ipsec systemd service (runs ovs-monitor-ipsec) with required configurable parameters for network operator. It's available with OVS 3.5 version, So OCP can use this service running on the host for configuring IPsec for east west traffic. Hence this commit includes openvswitch-ipsec package to be part of the ipsec extension, ovs-monitor-ipsec to be run as a systemd service on the node and ovn-ipsec-host pod would now only be used to configure the service. This provides more flexibility in managing IPsec connections created by OVN and OVS, helps to bring up existing IPsec connections timely before kubelet service comes up upon node reboot scenarios. Signed-off-by: Periyasamy Palanisamy <[email protected]>
2a27e82
to
61b76c1
Compare
@pperiyasamy: The following tests failed, say
Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
/retest |
1 similar comment
/retest |
/approve |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: igsilya, jlebon, pperiyasamy The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
e1cf9d5
into
openshift:master
Currently the network operator brings up ovn-ipsec-host daemonset pod once the ipsec machine config plugin is installed on the node. The pod spins up ovs-monitor-ipsec script to create/update mesh of IPsec connections across
the nodes. This makes ipsec connections to be established for the existing nodes a bit later after kubelet is started, but by the time workloads are scheduled on the node started hitting traffic drops because of unavailability of IPsec connections between nodes. This makes IPsec jobs in CI so unstable and monitor jobs always failing during IPsec upgrade.
The FDP story (https://issues.redhat.com/browse/FDP-1051) gets openvswitch-ipsec systemd service (runs ovs-monitor-ipsec) with required configurable parameters for network operator. It's available with OVS 3.5 version, So OCP can use this service running on the host for configuring IPsec for east west traffic.
This PR bumps OVS version to 3.5 and includes openvswitch-ipsec package to be part of the ipsec extension, It enables ovs-monitor-ipsec to be run as a systemd service on the node and ovn-ipsec-host pod would now only be used to configure the service. This provides more flexibility in managing IPsec connections created by OVN and OVS, helps to bring up existing IPsec connections timely before kubelet service comes up upon node reboot scenarios.