Skip to content

Commit 88f042d

Browse files
committed
Rebrand to Red Hat OpenShift Networking
Previously, the networking components of OpenShift were standalone, but now the totality of provided networking capabilities fall under the Red Hat OpenShift Networking umbrella. - https://issues.redhat.com/browse/SDN-3298
1 parent ad060ba commit 88f042d

File tree

70 files changed

+214
-187
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

70 files changed

+214
-187
lines changed

_attributes/common-attributes.adoc

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -155,3 +155,8 @@ endif::[]
155155
:openshift-dev-spaces-productname: Red Hat OpenShift Dev Spaces
156156
:factory-prestaging-tool: factory-precaching-cli tool
157157
:factory-prestaging-tool-caps: Factory-precaching-cli tool
158+
:openshift-networking: Red Hat OpenShift Networking
159+
// TODO - this probably needs to be different for OKD
160+
//ifdef::openshift-origin[]
161+
//:openshift-networking: OKD Networking
162+
//endif::[]

_topic_maps/_topic_map.yml

Lines changed: 44 additions & 42 deletions
Original file line numberDiff line numberDiff line change
@@ -1017,6 +1017,8 @@ Name: Networking
10171017
Dir: networking
10181018
Distros: openshift-enterprise,openshift-origin
10191019
Topics:
1020+
- Name: About networking
1021+
File: about-networking
10201022
- Name: Understanding networking
10211023
File: understanding-networking
10221024
- Name: Accessing hosts
@@ -1158,53 +1160,15 @@ Topics:
11581160
File: configuring-hardware-offloading
11591161
- Name: Uninstalling the SR-IOV Operator
11601162
File: uninstalling-sriov-operator
1161-
- Name: OpenShift SDN default CNI network provider
1162-
Dir: openshift_sdn
1163-
Topics:
1164-
- Name: About the OpenShift SDN default CNI network provider
1165-
File: about-openshift-sdn
1166-
- Name: Configuring egress IPs for a project
1167-
File: assigning-egress-ips
1168-
Distros: openshift-origin,openshift-enterprise
1169-
- Name: Configuring an egress firewall for a project
1170-
File: configuring-egress-firewall
1171-
- Name: Viewing an egress firewall for a project
1172-
File: viewing-egress-firewall
1173-
- Name: Editing an egress firewall for a project
1174-
File: editing-egress-firewall
1175-
- Name: Removing an egress firewall from a project
1176-
File: removing-egress-firewall
1177-
- Name: Considerations for the use of an egress router pod
1178-
File: using-an-egress-router
1179-
- Name: Deploying an egress router pod in redirect mode
1180-
File: deploying-egress-router-layer3-redirection
1181-
- Name: Deploying an egress router pod in HTTP proxy mode
1182-
File: deploying-egress-router-http-redirection
1183-
- Name: Deploying an egress router pod in DNS proxy mode
1184-
File: deploying-egress-router-dns-redirection
1185-
- Name: Configuring an egress router pod destination list from a config map
1186-
File: configuring-egress-router-configmap
1187-
- Name: Enabling multicast for a project
1188-
File: enabling-multicast
1189-
Distros: openshift-origin,openshift-enterprise
1190-
- Name: Disabling multicast for a project
1191-
File: disabling-multicast
1192-
Distros: openshift-origin,openshift-enterprise
1193-
- Name: Configuring multitenant isolation
1194-
File: multitenant-isolation
1195-
Distros: openshift-origin,openshift-enterprise
1196-
- Name: Configuring kube-proxy
1197-
File: configuring-kube-proxy
1198-
Distros: openshift-enterprise,openshift-origin
1199-
- Name: OVN-Kubernetes default CNI network provider
1163+
- Name: OVN-Kubernetes network plug-in
12001164
Dir: ovn_kubernetes_network_provider
12011165
Distros: openshift-origin,openshift-enterprise
12021166
Topics:
1203-
- Name: About the OVN-Kubernetes network provider
1167+
- Name: About the OVN-Kubernetes network plug-in
12041168
File: about-ovn-kubernetes
1205-
- Name: Migrating from the OpenShift SDN cluster network provider
1169+
- Name: Migrating from the OpenShift SDN network plug-in
12061170
File: migrate-from-openshift-sdn
1207-
- Name: Rolling back to the OpenShift SDN cluster network provider
1171+
- Name: Rolling back to the OpenShift SDN network plug-in
12081172
File: rollback-to-openshift-sdn
12091173
- Name: Converting to IPv4/IPv6 dual stack networking
12101174
File: converting-to-dual-stack
@@ -1236,6 +1200,44 @@ Topics:
12361200
File: tracking-network-flows
12371201
- Name: Configuring hybrid networking
12381202
File: configuring-hybrid-networking
1203+
- Name: OpenShift SDN network plug-in
1204+
Dir: openshift_sdn
1205+
Topics:
1206+
- Name: About the OpenShift SDN network plug-in
1207+
File: about-openshift-sdn
1208+
- Name: Configuring egress IPs for a project
1209+
File: assigning-egress-ips
1210+
Distros: openshift-origin,openshift-enterprise
1211+
- Name: Configuring an egress firewall for a project
1212+
File: configuring-egress-firewall
1213+
- Name: Viewing an egress firewall for a project
1214+
File: viewing-egress-firewall
1215+
- Name: Editing an egress firewall for a project
1216+
File: editing-egress-firewall
1217+
- Name: Removing an egress firewall from a project
1218+
File: removing-egress-firewall
1219+
- Name: Considerations for the use of an egress router pod
1220+
File: using-an-egress-router
1221+
- Name: Deploying an egress router pod in redirect mode
1222+
File: deploying-egress-router-layer3-redirection
1223+
- Name: Deploying an egress router pod in HTTP proxy mode
1224+
File: deploying-egress-router-http-redirection
1225+
- Name: Deploying an egress router pod in DNS proxy mode
1226+
File: deploying-egress-router-dns-redirection
1227+
- Name: Configuring an egress router pod destination list from a config map
1228+
File: configuring-egress-router-configmap
1229+
- Name: Enabling multicast for a project
1230+
File: enabling-multicast
1231+
Distros: openshift-origin,openshift-enterprise
1232+
- Name: Disabling multicast for a project
1233+
File: disabling-multicast
1234+
Distros: openshift-origin,openshift-enterprise
1235+
- Name: Configuring multitenant isolation
1236+
File: multitenant-isolation
1237+
Distros: openshift-origin,openshift-enterprise
1238+
- Name: Configuring kube-proxy
1239+
File: configuring-kube-proxy
1240+
Distros: openshift-enterprise,openshift-origin
12391241
- Name: Configuring Routes
12401242
Dir: routes
12411243
Topics:

logging/cluster-logging-deploying.adoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ include::modules/cluster-logging-deploy-console.adoc[leveloffset=+1]
3131

3232
If you plan to use Kibana, you must xref:#cluster-logging-visualizer-indices_cluster-logging-deploying[manually create your Kibana index patterns and visualizations] to explore and visualize data in Kibana.
3333

34-
If your cluster network provider enforces network isolation, xref:#cluster-logging-deploy-multitenant_cluster-logging-deploying[allow network traffic between the projects that contain the {logging} Operators].
34+
If your network plug-in enforces network isolation, xref:#cluster-logging-deploy-multitenant_cluster-logging-deploying[allow network traffic between the projects that contain the {logging} Operators].
3535

3636

3737
include::modules/cluster-logging-deploy-cli.adoc[leveloffset=+1]
@@ -40,7 +40,7 @@ include::modules/cluster-logging-deploy-cli.adoc[leveloffset=+1]
4040

4141
If you plan to use Kibana, you must xref:#cluster-logging-visualizer-indices_cluster-logging-deploying[manually create your Kibana index patterns and visualizations] to explore and visualize data in Kibana.
4242

43-
If your cluster network provider enforces network isolation, xref:#cluster-logging-deploy-multitenant_cluster-logging-deploying[allow network traffic between the projects that contain the {logging} Operators].
43+
If your network plug-in enforces network isolation, xref:#cluster-logging-deploy-multitenant_cluster-logging-deploying[allow network traffic between the projects that contain the {logging} Operators].
4444

4545
include::modules/cluster-logging-visualizer-indices.adoc[leveloffset=+2]
4646

@@ -50,8 +50,8 @@ include::modules/cluster-logging-deploy-multitenant.adoc[leveloffset=+2]
5050
.Additional resources
5151

5252
* xref:../networking/network_policy/about-network-policy.adoc[About network policy]
53-
* xref:../networking/openshift_sdn/about-openshift-sdn.adoc[About the OpenShift SDN default CNI network provider]
54-
* xref:../networking/ovn_kubernetes_network_provider/about-ovn-kubernetes.adoc[About the OVN-Kubernetes default Container Network Interface (CNI) network provider]
53+
* xref:../networking/openshift_sdn/about-openshift-sdn.adoc[About the OpenShift SDN network plug-in]
54+
* xref:../networking/ovn_kubernetes_network_provider/about-ovn-kubernetes.adoc[About the OVN-Kubernetes network plug-in]
5555

5656

5757
// include::modules/cluster-logging-deploy-memory.adoc[leveloffset=+1]

modules/cluster-logging-deploy-multitenant.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,11 +6,11 @@
66
[id="cluster-logging-deploy-multitenant_{context}"]
77
= Allowing traffic between projects when network isolation is enabled
88

9-
Your cluster network provider might enforce network isolation. If so, you must allow network traffic between the projects that contain the operators deployed by OpenShift Logging.
9+
Your cluster network plug-in might enforce network isolation. If so, you must allow network traffic between the projects that contain the operators deployed by OpenShift Logging.
1010

1111
Network isolation blocks network traffic between pods or services that are in different projects. The {logging} installs the _OpenShift Elasticsearch Operator_ in the `openshift-operators-redhat` project and the _Red Hat OpenShift Logging Operator_ in the `openshift-logging` project. Therefore, you must allow traffic between these two projects.
1212

13-
{product-title} offers two supported choices for the default Container Network Interface (CNI) network provider, OpenShift SDN and OVN-Kubernetes. These two providers implement various network isolation policies.
13+
{product-title} offers two supported choices for the network plug-in, OpenShift SDN and OVN-Kubernetes. These two providers implement various network isolation policies.
1414

1515
OpenShift SDN has three modes:
1616

modules/dr-restoring-cluster-state.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -292,7 +292,7 @@ If the status is `Pending`, or the output lists more than one running etcd pod,
292292
+
293293
[NOTE]
294294
====
295-
Perform the following step only if you are using `OVNKubernetes` Container Network Interface (CNI) plug-in.
295+
Perform the following step only if you are using `OVNKubernetes` network plug-in.
296296
====
297297
+
298298
. Restart the Open Virtual Network (OVN) Kubernetes pods on all the hosts.

modules/install-sno-about-installing-on-a-single-node.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,5 +10,5 @@ You can create a single-node cluster with standard installation methods. {produc
1010

1111
[IMPORTANT]
1212
====
13-
The use of OpenShiftSDN with {sno} is not supported. OVN-Kubernetes is the default networking solution for {sno} deployments.
13+
The use of OpenShiftSDN with {sno} is not supported. OVN-Kubernetes is the default network plug-in for {sno} deployments.
1414
====

modules/install-sno-generating-the-install-iso-manually.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -121,7 +121,7 @@ capabilities:
121121
<2> Set the `compute` replicas to `0`. This makes the control plane node schedulable.
122122
<3> Set the `controlPlane` replicas to `1`. In conjunction with the previous `compute` setting, this setting ensures the cluster runs on a single node.
123123
<4> Set the `metadata` name to the cluster name.
124-
<5> Set the `networking` details. OVN-Kubernetes is the only allowed networking type for single-node clusters.
124+
<5> Set the `networking` details. OVN-Kubernetes is the only allowed network plug-in type for single-node clusters.
125125
<6> Set the `cidr` value to match the subnet of the {sno} cluster.
126126
<7> Set the path to the installation disk drive, for example, `/dev/disk/by-id/wwn-0x64cd98f04fde100024684cf3034da5c2`.
127127
<8> Copy the {cluster-manager-url-pull} and add the contents to this configuration setting.

modules/installation-bare-metal-agent-installer-config-yaml.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ Class E CIDR range is reserved for a future use. To use the Class E CIDR range,
6969
====
7070
+
7171
<8> The subnet prefix length to assign to each individual node. For example, if `hostPrefix` is set to `23`, then each node is assigned a `/23` subnet out of the given `cidr`, which allows for 510 (2^(32 - 23) - 2) pod IP addresses. If you are required to provide access to nodes from an external network, configure load balancers and routers to manage the traffic.
72-
<9> The cluster network provider Container Network Interface (CNI) plug-in to install. The supported values are `OVNKubernetes` (default value) and `OpenShiftSDN` .
72+
<9> The cluster network plug-in to install. The supported values are `OVNKubernetes` (default value) and `OpenShiftSDN`.
7373
<10> The IP address pool to use for service IP addresses. You can enter only one IP address pool. This block must not overlap with existing physical networks. If you need to access the services from an external network, configure load balancers and routers to manage the traffic.
7474
<11> You must set the platform to `none` for a single-node cluster. You can also set the platform to `vSphere` and `baremetal`.
7575
+

modules/installation-configuration-parameters.adoc

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -306,9 +306,9 @@ You can customize your installation configuration based on the requirements of y
306306
// https://bugzilla.redhat.com/show_bug.cgi?id=2020416
307307
// Once BM UPI supports dual-stack, uncomment all the following conditionals and blocks
308308

309-
* If you use the OVN-Kubernetes cluster network provider, both IPv4 and IPv6 address families are supported.
309+
* If you use the {openshift-networking} OVN-Kubernetes network plug-in, both IPv4 and IPv6 address families are supported.
310310

311-
* If you use the OpenShift SDN cluster network provider, only the IPv4 address family is supported.
311+
* If you use the {openshift-networking} OpenShift SDN network plug-in, only the IPv4 address family is supported.
312312

313313
ifdef::ibm-cloud[]
314314
[NOTE]
@@ -358,13 +358,13 @@ You cannot modify parameters specified by the `networking` object after installa
358358
====
359359

360360
|`networking.networkType`
361-
|The cluster network provider Container Network Interface (CNI) plug-in to install.
361+
|The {openshift-networking} network plug-in to install.
362362
|
363363
ifdef::openshift-origin[]
364364
Either `OpenShiftSDN` or `OVNKubernetes`. The default value is `OVNKubernetes`.
365365
endif::openshift-origin[]
366366
ifndef::openshift-origin[]
367-
Either `OpenShiftSDN` or `OVNKubernetes`. `OpenShiftSDN` is a CNI provider for all-Linux networks. `OVNKubernetes` is a CNI provider for Linux networks and hybrid networks that contain both Linux and Windows servers. The default value is `OpenShiftSDN`.
367+
Either `OpenShiftSDN` or `OVNKubernetes`. `OpenShiftSDN` is a CNI plugin for all-Linux networks. `OVNKubernetes` is a CNI plugin for Linux networks and hybrid networks that contain both Linux and Windows servers. The default value is `OpenShiftSDN`.
368368
endif::openshift-origin[]
369369

370370
|`networking.clusterNetwork`
@@ -390,7 +390,7 @@ networking:
390390
|
391391
Required if you use `networking.clusterNetwork`. An IP address block.
392392

393-
If you use the OpenShift SDN network provider, specify an IPv4 network. If you use the OVN-Kubernetes network provider, you can specify IPv4 and IPv6 networks.
393+
If you use the OpenShift SDN network plug-in, specify an IPv4 network. If you use the OVN-Kubernetes network plug-in, you can specify IPv4 and IPv6 networks.
394394
|
395395
An IP address block in Classless Inter-Domain Routing (CIDR) notation.
396396
The prefix length for an IPv4 block is between `0` and `32`.
@@ -408,9 +408,9 @@ For an IPv6 network the default value is `64`. The default value is also the min
408408
|
409409
The IP address block for services. The default value is `172.30.0.0/16`.
410410

411-
The OpenShift SDN and OVN-Kubernetes network providers support only a single IP address block for the service network.
411+
The OpenShift SDN and OVN-Kubernetes network plug-ins support only a single IP address block for the service network.
412412

413-
If you use the OVN-Kubernetes network provider, you can specify an IP address block for both of the IPv4 and IPv6 address families.
413+
If you use the OVN-Kubernetes network plug-in, you can specify an IP address block for both of the IPv4 and IPv6 address families.
414414

415415
|
416416
An array with an IP address block in CIDR format. For example:

modules/microshift-cni.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,9 @@
44

55
:_content-type: CONCEPT
66
[id="microshift-cni_{context}"]
7-
= About the OVN-Kubernetes CNI network provider
7+
= About the OVN-Kubernetes network plugin
88

9-
OVN-Kubernetes is the default networking solution for {product-title} deployments. OVN-Kubernetes is a virtualized network for pods and services that is based on Open Virtual Network (OVN). The OVN-Kubernetes Container Network Interface (CNI) plug-in is the network provider for the cluster. A cluster that uses the OVN-Kubernetes network provider also runs Open vSwitch (OVS) on the node. OVN configures OVS on the node to implement the declared network configuration.
9+
OVN-Kubernetes is the default networking solution for {product-title} deployments. OVN-Kubernetes is a virtualized network for pods and services that is based on Open Virtual Network (OVN). The OVN-Kubernetes Container Network Interface (CNI) plugin is the network plugin for the cluster. A cluster that uses the OVN-Kubernetes network plugin also runs Open vSwitch (OVS) on the node. OVN configures OVS on the node to implement the declared network configuration.
1010

1111
[id="microshift-network-topology_{context}"]
1212
== Network topology

0 commit comments

Comments
 (0)