You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
= Checking cluster readiness to run DPDK applications with zero packet loss
7
+
= DPDK checkup
8
8
9
-
Use a predefined checkup to verify if your {product-title} cluster node can run a virtual machine (VM) with a Data Plane Development Kit (DPDK) workload. The checkup runs traffic between a traffic generator pod and a VM running a test DPDK application, and checks for packet loss.
9
+
Use a predefined checkup to verify that your {product-title} cluster node can run a virtual machine (VM) with a Data Plane Development Kit (DPDK) workload with zero packet loss. The DPDK checkup runs traffic between a traffic generator pod and a VM running a test DPDK application.
10
+
11
+
You run a DPDK checkup by performing the following steps:
12
+
13
+
. Create a service account, role, and role bindings for the DPDK checkup and a service account for the traffic generator pod.
14
+
. Create a security context constraints resource for the traffic generator pod.
15
+
. Create a config map to provide the input to run the checkup and to store the results.
16
+
. Create a job to run the checkup.
17
+
. Review the results in the config map.
18
+
. Optional: To rerun the checkup, delete the existing config map and job and then create a new config map and job.
19
+
. When you are finished, delete the DPDK checkup resources.
10
20
11
21
.Prerequisites
12
22
* You have access to the cluster as a user with `cluster-admin` permissions.
13
23
* You have installed the OpenShift CLI (`oc`).
14
24
* You have configured the compute nodes to run DPDK applications on VMs with zero packet loss.
15
25
16
26
.Procedure
17
-
. Create a manifest file that contains the `ServiceAccount`, `Role`, and `RoleBinding` objects with permissions that the checkup requires for cluster access:
27
+
28
+
. Create a `ServiceAccount`, `Role`, and `RoleBinding` manifest for the DPDK checkup and the traffic generator pod:
18
29
+
19
-
.Example roles manifest
30
+
.Example service account, role, and rolebinding manifest file
20
31
[%collapsible]
21
32
====
22
33
[source,yaml]
@@ -80,17 +91,71 @@ roleRef:
80
91
apiGroup: rbac.authorization.k8s.io
81
92
kind: Role
82
93
name: kubevirt-dpdk-checker
94
+
---
95
+
apiVersion: v1
96
+
kind: ServiceAccount
97
+
metadata:
98
+
name: dpdk-checkup-traffic-gen-sa
83
99
----
84
100
====
85
101
86
-
. Apply the checkup roles manifest:
102
+
. Apply the `ServiceAccount`, `Role`, and `RoleBinding` manifest:
= Checking network connectivity and latency for virtual machines on a secondary network
7
+
= Virtual machine latency checkup
8
8
9
-
You use a predefined checkup to verify network connectivity and measure latency between two virtual machines (VMs) that are attached to a secondary network interface.
9
+
You use a predefined checkup to verify network connectivity and measure latency between two virtual machines (VMs) that are attached to a secondary network interface. The latency checkup uses the ping utility.
10
10
11
-
To run a checkup for the first time, follow the steps in the procedure.
11
+
You run a latency checkup by performing the following steps:
12
12
13
-
If you have previously run a checkup, skip to step 5 of the procedure because the steps to install the framework and enable permissions for the checkup are not required.
13
+
. Create a service account, roles, and rolebindings to provide cluster access permissions to the latency checkup.
14
+
. Create a config map to provide the input to run the checkup and to store the results.
15
+
. Create a job to run the checkup.
16
+
. Review the results in the config map.
17
+
. Optional: To rerun the checkup, delete the existing config map and job and then create a new config map and job.
18
+
. When you are finished, delete the latency checkup resources.
14
19
15
20
.Prerequisites
16
21
@@ -21,7 +26,7 @@ If you have previously run a checkup, skip to step 5 of the procedure because th
21
26
22
27
.Procedure
23
28
24
-
. Create a manifest file that contains the `ServiceAccount`, `Role`, and `RoleBinding`objects with permissions that the checkup requires for cluster access:
29
+
. Create a `ServiceAccount`, `Role`, and `RoleBinding`manifest for the latency checkup:
25
30
+
26
31
.Example role manifest file
27
32
[%collapsible]
@@ -84,15 +89,15 @@ roleRef:
84
89
----
85
90
====
86
91
87
-
. Apply the checkup roles manifest:
92
+
. Apply the `ServiceAccount`, `Role`, and `RoleBinding` manifest:
<1> `<target_namespace>` is the namespace where the checkup is to be run. This must be an existing namespace where the `NetworkAttachmentDefinition` object resides.
94
99
95
-
. Create a `ConfigMap` manifest that contains the input parameters for the checkup. The config map provides the input for the framework to run the checkup and also stores the results of the checkup.
100
+
. Create a `ConfigMap` manifest that contains the input parameters for the checkup:
0 commit comments