Skip to content

Commit 87e870b

Browse files
authored
Merge pull request #97565 from dfitzmau/OCPBUGS-36674-15
[enterprise-4.15] OCPBUGS-36674-re: Documented support limitations for day 2 OVNK confi…
2 parents 133e0ae + c131055 commit 87e870b

File tree

3 files changed

+23
-14
lines changed

3 files changed

+23
-14
lines changed

modules/nw-ovn-kuberentes-limitations.adoc

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,17 +2,18 @@
22
//
33
// * networking/ovn_kubernetes_network_provider/about-ovn-kubernetes.adoc
44

5+
:_mod-docs-content-type: REFERENCE
56
[id="nw-ovn-kubernetes-limitations_{context}"]
67
= OVN-Kubernetes IPv6 and dual-stack limitations
78

89
The OVN-Kubernetes network plugin has the following limitations:
910

10-
* If you set the `ipv6.disable` parameter to `1` in the `kernelArgument` section of the `MachineConfig` custom resource (CR) for your cluster, OVN-Kubernetes pods enter a `CrashLoopBackOff` state. Additionally, updating your cluster to a later version of {product-title} fails because the Network Operator is stuck on a `Degraded` state. Red{nbsp}Hat does not support disabling IPv6 adddresses for your cluster so do not set the `ipv6.disable` parameter to `1`.
11-
1211
// The foll limitation is also recorded in the installation section.
1312
* For clusters configured for dual-stack networking, both IPv4 and IPv6 traffic must use the same network interface as the default gateway.
13+
+
1414
If this requirement is not met, pods on the host in the `ovnkube-node` daemon set enter the `CrashLoopBackOff` state.
15-
If you display a pod with a command such as `oc get pod -n openshift-ovn-kubernetes -l app=ovnkube-node -o yaml`, the `status` field contains more than one message about the default gateway, as shown in the following output:
15+
+
16+
If you display a pod with a command such as `oc get pod -n openshift-ovn-kubernetes -l app=ovnkube-node -o yaml`, the `status` field has more than one message about the default gateway, as shown in the following output:
1617
+
1718
[source,terminal]
1819
----
@@ -24,8 +25,10 @@ F1006 16:09:50.985939 60651 ovnkube.go:130] multiple gateway interfaces detect
2425
The only resolution is to reconfigure the host networking so that both IP families use the same network interface for the default gateway.
2526
2627
* For clusters configured for dual-stack networking, both the IPv4 and IPv6 routing tables must contain the default gateway.
28+
+
2729
If this requirement is not met, pods on the host in the `ovnkube-node` daemon set enter the `CrashLoopBackOff` state.
28-
If you display a pod with a command such as `oc get pod -n openshift-ovn-kubernetes -l app=ovnkube-node -o yaml`, the `status` field contains more than one message about the default gateway, as shown in the following output:
30+
+
31+
If you display a pod with a command such as `oc get pod -n openshift-ovn-kubernetes -l app=ovnkube-node -o yaml`, the `status` field has more than one message about the default gateway, as shown in the following output:
2932
+
3033
[source,terminal]
3134
----
@@ -34,3 +37,5 @@ F0512 19:07:17.589141 108432 ovnkube.go:133] failed to get default gateway inte
3437
----
3538
+
3639
The only resolution is to reconfigure the host networking so that both IP families contain the default gateway.
40+
41+
* If you set the `ipv6.disable` parameter to `1` in the `kernelArgument` section of the `MachineConfig` custom resource (CR) for your cluster, OVN-Kubernetes pods enter a `CrashLoopBackOff` state. Additionally, updating your cluster to a later version of {product-title} fails because the Network Operator remains on a `Degraded` state. Red{nbsp}Hat does not support disabling IPv6 adddresses for your cluster so do not set the `ipv6.disable` parameter to `1`.

modules/nw-ovn-kubernetes-features.adoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
//
33
// * networking/ovn_kubernetes_network_provider/about-ovn-kubernetes.adoc
44

5+
:_mod-docs-content-type: CONCEPT
56
[id="nw-ovn-kubernetes-purpose_{context}"]
67
= OVN-Kubernetes purpose
78

networking/ovn_kubernetes_network_provider/about-ovn-kubernetes.adoc

Lines changed: 13 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -18,20 +18,23 @@ OVN configures OVS on each node to implement the declared network configuration.
1818
OVN-Kubernetes is the default networking solution for {product-title} and {sno} deployments.
1919
====
2020

21-
OVN-Kubernetes, which arose from the OVS project, uses many of the same constructs, such as open flow rules, to determine how packets travel through the network.
22-
For more information, see the link:https://www.ovn.org/en/[Open Virtual Network website].
21+
OVN-Kubernetes, which arose from the OVS project, uses many of the same constructs, such as open flow rules, to decide how packets travel through the network. For more information, see the link:https://www.ovn.org/en/[Open Virtual Network website].
2322

24-
OVN-Kubernetes is a series of daemons for OVS that translate virtual network configurations into `OpenFlow` rules.
25-
`OpenFlow` is a protocol for communicating with network switches and routers, providing a means for remotely controlling the flow of network traffic on a network device, allowing network administrators to configure, manage, and monitor the flow of network traffic.
23+
OVN-Kubernetes is a series of daemons for OVS that transform virtual network configurations into `OpenFlow` rules. `OpenFlow` is a protocol for communicating with network switches and routers, providing a means for remotely controlling the flow of network traffic on a network device. This means that network administrators can configure, manage, and watch the flow of network traffic.
2624

27-
OVN-Kubernetes provides more of the advanced functionality not available with `OpenFlow`.
28-
OVN supports distributed virtual routing, distributed logical switches, access control, DHCP and DNS.
29-
OVN implements distributed virtual routing within logic flows which equate to open flows.
30-
So for example if you have a pod that sends out a DHCP request on the network, it sends out that broadcast looking for DHCP address there will be a logic flow rule that matches that packet, and it responds giving it a gateway, a DNS server an IP address and so on.
25+
OVN-Kubernetes provides more of the advanced functionality not available with `OpenFlow`. OVN supports distributed virtual routing, distributed logical switches, access control, Dynamic Host Configuration Protocol (DHCP), and DNS. OVN implements distributed virtual routing within logic flows that equate to open flows. For example, if you have a pod that sends out a DHCP request to the DHCP server on the network, a logic flow rule in the request helps the OVN-Kubernetes handle the packet. This means that the server can respond with gateway, DNS server, IP address, and other information.
3126

32-
OVN-Kubernetes runs a daemon on each node. There are daemon sets for the databases and for the OVN controller that run on every node.
33-
The OVN controller programs the Open vSwitch daemon on the nodes to support the network provider features; egress IPs, firewalls, routers, hybrid networking, IPSEC encryption, IPv6, network policy, network policy logs, hardware offloading and multicast.
27+
OVN-Kubernetes runs a daemon on each node. There are daemon sets for the databases and for the OVN controller that run on every node. The OVN controller programs the Open vSwitch daemon on the nodes to support the following network provider features:
3428

29+
* Egress IPs
30+
* Firewalls
31+
* Hardware offloading
32+
* Hybrid networking
33+
* Internet Protocol Security (IPsec) encryption
34+
* IPv6
35+
* Multicast.
36+
* Network policy and network policy logs
37+
* Routers
3538
3639
include::modules/nw-ovn-kubernetes-features.adoc[leveloffset=+1]
3740

0 commit comments

Comments
 (0)