Skip to content

Commit 69e8e71

Browse files
authored
Merge pull request #60159 from dfitzmau/OCPBUGS-9257
OCPBUGS#9257: Updating the Egress router modes module
2 parents 1617add + aaa0f21 commit 69e8e71

File tree

2 files changed

+12
-2
lines changed

2 files changed

+12
-2
lines changed

modules/nw-egress-router-about.adoc

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,12 @@ The egress router image is not compatible with Amazon AWS, Azure Cloud, or any o
3737
[id="nw-egress-router-about-modes_{context}"]
3838
== Egress router modes
3939

40-
In _redirect mode_, an egress router pod configures `iptables` rules to redirect traffic from its own IP address to one or more destination IP addresses. Client pods that need to use the reserved source IP address must be modified to connect to the egress router rather than connecting directly to the destination IP.
40+
In _redirect mode_, an egress router pod configures `iptables` rules to redirect traffic from its own IP address to one or more destination IP addresses. Client pods that need to use the reserved source IP address must be configured to access the service for the egress router rather than connecting directly to the destination IP. You can access the destination service and port from the application pod by using the `curl` command. For example:
41+
42+
[source, terminal]
43+
----
44+
$ curl <router_service_IP> <port>
45+
----
4146

4247
ifdef::openshift-sdn[]
4348
In _HTTP proxy mode_, an egress router pod runs as an HTTP proxy on port `8080`. This mode only works for clients that are connecting to HTTP-based or HTTPS-based services, but usually requires fewer changes to the client pods to get them to work. Many programs can be told to use an HTTP proxy by setting an environment variable.

modules/nw-egress-router-redirect-mode.adoc

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,12 @@
66
[id="nw-egress-router-redirect-mode_{context}"]
77
= Deploying an egress router pod in redirect mode
88

9-
In _redirect mode_, an egress router pod sets up iptables rules to redirect traffic from its own IP address to one or more destination IP addresses. Client pods that need to use the reserved source IP address must be modified to connect to the egress router rather than connecting directly to the destination IP.
9+
In _redirect mode_, an egress router pod sets up iptables rules to redirect traffic from its own IP address to one or more destination IP addresses. Client pods that need to use the reserved source IP address must be configured to access the service for the egress router rather than connecting directly to the destination IP. You can access the destination service and port from the application pod by using the `curl` command. For example:
10+
11+
[source, terminal]
12+
----
13+
$ curl <router_service_IP> <port>
14+
----
1015

1116
.Prerequisites
1217

0 commit comments

Comments
 (0)