You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Replace old doc with the new process that uses
the `EgressRouter` object.
Feedback from Daniel:
* Acknowledge that the Operator adds the NAD and deployment.
* The operator also removes them when an egress router is
deleted.
* Change "Failover config" to describe the deployment and
mention svc rather that suggest customers can do this for
themselves.
Remove the technology preview admonition.
Remove file modules/nw-egress-router-network-attachment.adoc because
customers do not need to make the NAD themselves after this release.
Change from "Partial support" to "Supported" in the
Supported default CNI network provider feature matrix and change
the numbering to be *more* sequential.
Add `fallbackIP` based on openshift/cluster-network-operator#1094.
Specify IP address in CIDR notation. Correction from Mohamed. Remove
the `spec.networkInterface` field, also from Mohamed.
Update migration process to indicate redirect is supported and
that HTTP mode and DNS mode are not supported. Also indicate
that the Operator does not offer a provision for a node selector.
Add `metadata.namespace` to the YAML.
Review from Ashley.
Copy file name to clipboardExpand all lines: modules/nw-egress-router-about.adoc
+34-24Lines changed: 34 additions & 24 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ endif::[]
21
21
[id="nw-egress-router-about_{context}"]
22
22
= About an egress router pod
23
23
24
-
The {product-title} egress router pod redirects traffic to a specified remote server from a private source IP address that is not used for any other purpose. An egress router pod enables you to send network traffic to servers that are set up to allow access only from specific IP addresses.
24
+
The {product-title} egress router pod redirects traffic to a specified remote server from a private source IP address that is not used for any other purpose. An egress router pod can send network traffic to servers that are set up to allow access only from specific IP addresses.
25
25
26
26
[NOTE]
27
27
====
@@ -49,7 +49,7 @@ endif::openshift-sdn[]
49
49
ifdef::ovn[]
50
50
[NOTE]
51
51
====
52
-
The egress router CNI plug-in supports redirect mode only. This is a difference with the egress router implementation that you can deploy with OpenShift SDN. Unlike the egress router for OpenShift SDN, the egress router CNI plug-in does not support _HTTP proxy mode_ or _DNS proxy mode_.
52
+
The egress router CNI plug-in supports redirect mode only. This is a difference with the egress router implementation that you can deploy with OpenShift SDN. Unlike the egress router for OpenShift SDN, the egress router CNI plug-in does not support HTTP proxy mode or DNS proxy mode.
53
53
====
54
54
endif::ovn[]
55
55
@@ -73,6 +73,14 @@ An egress router is a pod that has two network interfaces. For example, the pod
73
73
74
74
Traffic that leaves the egress router exits through a node, but the packets
75
75
have the MAC address of the `net1` interface from the egress router pod.
76
+
77
+
When you add an egress router custom resource, the Cluster Network Operator creates the following objects:
78
+
79
+
* The network attachment definition for the `net1` secondary network interface of the pod.
80
+
81
+
* A deployment for the egress router.
82
+
83
+
If you delete an egress router custom resource, the Operator deletes the two objects in the preceding list that are associated with the egress router.
@@ -107,9 +115,9 @@ Specifically, ensure that the following are enabled:
107
115
[id="nw-egress-router-about-failover_{context}"]
108
116
== Failover configuration
109
117
118
+
ifdef::openshift-sdn[]
110
119
To avoid downtime, you can deploy an egress router pod with a `Deployment` resource, as in the following example. To create a new `Service` object for the example deployment, use the `oc expose deployment/egress-demo-controller` command.
111
120
112
-
ifdef::openshift-sdn[]
113
121
[source,yaml,subs="attributes+"]
114
122
----
115
123
apiVersion: apps/v1
@@ -134,36 +142,38 @@ spec:
134
142
containers:
135
143
...
136
144
----
145
+
<1> Ensure that replicas is set to `1`, because only one pod can use a given egress source IP address at any time. This means that only a single copy of the router runs on a node.
146
+
147
+
<2> Specify the `Pod` object template for the egress router pod.
137
148
endif::openshift-sdn[]
138
149
139
150
ifdef::ovn[]
151
+
To avoid downtime, the Cluster Network Operator deploys the egress router pod as a deployment resource. The deployment name is `egress-router-cni-deployment`. The pod that corresponds to the deployment has a label of `app=egress-router-cni`.
152
+
153
+
To create a new service for the deployment, use the `oc expose deployment/egress-router-cni-deployment --port <port_number>` command or create a file like the following example:
<1> Ensure that replicas is set to `1`, because only one pod can use a given egress source IP address at any time. This means that only a single copy of the router runs on a node.
165
-
166
-
<2> Specify the `Pod` object template for the egress router pod.
Define the configuration for an egress router pod in an egress router custom resource. The following YAML describes the fields for the configuration of an egress router in {router-type} mode:
<.> Optional: The `namespace` field specifies the namespace to create the egress router in. If you do not specify a value in the file or on the command line, the `default` namespace is used.
47
+
48
+
<.> The `addresses` field specifies the IP addresses to configure on the secondary network interface.
49
+
50
+
<.> The `ip` field specifies the reserved source IP address and netmask from the physical network that the node is on to use with egress router pod. Use CIDR notation to specify the IP address and netmask.
51
+
52
+
<.> The `gateway` field specifies the IP address of the network gateway.
53
+
54
+
<.> Optional: The `redirectRules` field specifies a combination of egress destination IP address, egress router port, and protocol. Incoming connections to the egress router on the specified port and protocol are routed to the destination IP address.
55
+
56
+
<.> Optional: The `targetPort` field specifies the network port on the destination IP address. If this field is not specified, traffic is routed to the same network port that it arrived on.
57
+
58
+
<.> The `protocol` field supports TCP, UDP, or SCTP.
59
+
60
+
<.> Optional: The `fallbackIP` field specifies a destination IP address. If you do not specify any redirect rules, the egress router sends all traffic to this fallback IP address. If you specify redirect rules, any connections to network ports that are not defined in the rules are sent by the egress router to this fallback IP address. If you do not specify this field, the egress router rejects connections to network ports that are not defined in the rules.
0 commit comments