You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Use a predefined checkup to verify that your {product-title} cluster node can run a virtual machine (VM) with a Data Plane Development Kit (DPDK) workload with zero packet loss. The DPDK checkup runs traffic between a traffic generator pod and a VM running a test DPDK application.
9
+
Use a predefined checkup to verify that your {product-title} cluster node can run a virtual machine (VM) with a Data Plane Development Kit (DPDK) workload with zero packet loss. The DPDK checkup runs traffic between a traffic generator and a VM running a test DPDK application.
10
10
11
11
You run a DPDK checkup by performing the following steps:
12
12
13
-
. Create a service account, role, and role bindings for the DPDK checkup and a service account for the traffic generator pod.
14
-
. Create a security context constraints resource for the traffic generator pod.
13
+
. Create a service account, role, and role bindings for the DPDK checkup.
15
14
. Create a config map to provide the input to run the checkup and to store the results.
16
15
. Create a job to run the checkup.
17
16
. Review the results in the config map.
18
17
. Optional: To rerun the checkup, delete the existing config map and job and then create a new config map and job.
19
18
. When you are finished, delete the DPDK checkup resources.
20
19
21
20
.Prerequisites
22
-
* You have access to the cluster as a user with `cluster-admin` permissions.
23
21
* You have installed the OpenShift CLI (`oc`).
24
-
* You have configured the compute nodes to run DPDK applications on VMs with zero packet loss.
25
-
26
-
[IMPORTANT]
27
-
====
28
-
The traffic generator pod created by the checkup has elevated privileges:
29
-
30
-
* It runs as root.
31
-
* It has a bind mount to the node's file system.
32
-
33
-
The container image of the traffic generator is pulled from the upstream Project Quay container registry.
34
-
====
22
+
* The cluster is configured to run DPDK applications.
23
+
* The project is configured to run DPDK applications.
35
24
36
25
.Procedure
37
26
38
-
. Create a `ServiceAccount`, `Role`, and `RoleBinding` manifest for the DPDK checkup and the traffic generator pod:
27
+
. Create a `ServiceAccount`, `Role`, and `RoleBinding` manifest for the DPDK checkup:
39
28
+
40
29
.Example service account, role, and rolebinding manifest file
* xref:../../virt/virtual_machines/vm_networking/virt-attaching-vm-to-sriov-network.adoc#virt-configuring-vm-project-dpdk_virt-attaching-vm-to-sriov-network[Configuring a project for DPDK workloads]
27
28
* xref:../../virt/virtual_machines/vm_networking/virt-attaching-vm-multiple-networks.adoc#virt-attaching-vm-multiple-networks[Attaching a virtual machine to multiple networks]
28
29
* xref:../../networking/hardware_networks/using-dpdk-and-rdma.adoc#example-vf-use-in-dpdk-mode-intel_using-dpdk-and-rdma[Using a virtual function in DPDK mode with an Intel NIC]
29
30
* xref:../../networking/hardware_networks/using-dpdk-and-rdma.adoc#nw-example-dpdk-line-rate_using-dpdk-and-rdma[Using SR-IOV and the Node Tuning Operator to achieve a DPDK line rate]
0 commit comments