Skip to content

Commit 16a393a

Browse files
committed
updating with QE feedback
1 parent d37eba8 commit 16a393a

File tree

2 files changed

+9
-8
lines changed

2 files changed

+9
-8
lines changed

modules/nw-metallb-infra-considerations.adoc

Lines changed: 2 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -24,12 +24,6 @@ MetalLB Operator and MetalLB are supported with the OpenShift SDN and OVN-Kubern
2424
[id="additional_network_and_metallb_limitation_{context}"]
2525
== Additional Network and MetalLB cannot use same network
2626

27-
If you use the same VLAN for both MetalLB and an additional network interface configured on a source pod, it can lead to a connection failure. A connection failure happens when both the MetalLB IP and the source pod are on the same node.
27+
Using the same VLAN for both MetalLB and an additional network interface set up on a source pod may result in a connection failure. This occurs when both the MetalLB IP and the source pod reside on the same node.
2828

29-
To resolve this issue, you have a couple of options:
30-
31-
* **Use Different Subnets**: To avoid connection failures, consider placing the MetalLB IP in a different subnet from the one where the source pod resides. By doing this, traffic from the source pod will take the default gateway, which is typically OVN-K. This way, the traffic can reach its destination by using the OVN overlay network, and the connection should work as expected.
32-
33-
* **Switch to MACVLAN Interface**: Alternatively, you can opt to use a MACVLAN interface instead of a VLAN interface for your additional network configuration. MACVLAN interfaces provide a more isolated network environment and can help prevent conflicts with MetalLB configurations. This change in interface type can help you avoid the connection issues that might arise when using the same VLAN for MetalLB and an additional network interface on the source pod.
34-
35-
You can address this by ensuring the MetalLB IP is in another subnet so the traffic coming from a pod would take the default gateway, which is OVN-K and reach the destination via the OVN overlay. Alternatively use a MACVLAN interface instead of a VLAN interface.
29+
To avoid connection failures, place the MetalLB IP in a different subnet from the one where the source pod resides. This configuration ensures that traffic from the source pod will take the default gateway, which is typically OVN-Kubernetes. Consequently, the traffic can effectively reach its destination by using the OVN overlay network, ensuring that the connection functions as intended.

modules/nw-metallb-layer2-limitations.adoc

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,3 +34,10 @@ The old node can continue to forward traffic for outdated clients until their ca
3434

3535
During an unplanned failover, the service IPs are unreachable until the outdated clients refresh their cache entries.
3636

37+
[id="additional_network_and_metallb_limitation_{context}"]
38+
== Additional Network and MetalLB cannot use same network
39+
40+
Using the same VLAN for both MetalLB and an additional network interface set up on a source pod may result in a connection failure. This occurs when both the MetalLB IP and the source pod reside on the same node.
41+
42+
To avoid connection failures, place the MetalLB IP in a different subnet from the one where the source pod resides. This configuration ensures that traffic from the source pod will take the default gateway, which is typically OVN-Kubernetes. Consequently, the traffic can effectively reach its destination by using the OVN overlay network, ensuring that the connection functions as intended.
43+

0 commit comments

Comments
 (0)