Skip to content

Commit cb4478f

Browse files
authored
Merge pull request #55763 from ShaunaDiaz/OSDOCS-5274
OSDOCS-5274: Restart node when changing mtu value
2 parents 80049dd + 12698ee commit cb4478f

19 files changed

+125
-127
lines changed

_topic_maps/_topic_map_ms.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -104,8 +104,10 @@ Name: Networking
104104
Dir: microshift_networking
105105
Distros: microshift
106106
Topics:
107-
- Name: Understanding networking
107+
- Name: Applying networking settings
108108
File: microshift-networking
109+
- Name: Using a firewall
110+
File: microshift-firewall
109111
---
110112
Name: Storage
111113
Dir: microshift_storage

microshift_install/microshift-embed-in-rpm-ostree.adoc

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -50,12 +50,12 @@ include::modules/microshift-provisioning-ostree.adoc[leveloffset=+1]
5050
[role="_additional-resources_microshift-embed-in-rpm-ostree"]
5151
.Additional resources
5252

53-
. https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html-single/composing_installing_and_managing_rhel_for_edge_images/index[{op-system-ostree} documentation].
54-
. xref:../microshift_install/microshift-install-rpm.adoc#system-requirements-installing-microshift[System requirements for installing {product-title}].
55-
. Red Hat Hybrid Cloud Console link:https://console.redhat.com/openshift/install/pull-secret[pull secret].
56-
. xref:../microshift_networking/microshift-networking.adoc#microshift-firewall-req-settings_microshift-networking[Required firewall settings].
57-
. link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/performing_an_advanced_rhel_8_installation/creating-kickstart-files_installing-rhel-as-an-experienced-user[Creating a Kickstart file].
58-
. link:https://access.redhat.com/solutions/60959[How to embed a Kickstart file into an ISO image].
53+
* link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html-single/composing_installing_and_managing_rhel_for_edge_images/index[{op-system-ostree} documentation].
54+
* xref:../microshift_install/microshift-install-rpm.adoc#system-requirements-installing-microshift[System requirements for installing {product-title}].
55+
* Red Hat Hybrid Cloud Console link:https://console.redhat.com/openshift/install/pull-secret[pull secret].
56+
* xref:../microshift_networking/microshift-firewall.adoc#microshift-firewall-req-settings_microshift-networking[Required firewall settings].
57+
* link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/performing_an_advanced_rhel_8_installation/creating-kickstart-files_installing-rhel-as-an-experienced-user[Creating a Kickstart file].
58+
* link:https://access.redhat.com/solutions/60959[How to embed a Kickstart file into an ISO image].
5959

6060
include::modules/microshift-accessing.adoc[leveloffset=+1]
6161
include::modules/microshift-accessing-cluster-locally.adoc[leveloffset=+2]

microshift_networking/ingress-operator-microshift.adoc

Lines changed: 0 additions & 87 deletions
This file was deleted.
Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
:_content-type: ASSEMBLY
2+
[id="microshift-using-a-firewall"]
3+
= Using a firewall
4+
include::_attributes/attributes-microshift.adoc[]
5+
:context: microshift-firewall
6+
7+
toc::[]
8+
9+
Firewalls are not required in {product-title}, but using a firewall can prevent undesired access to the {product-title} API.
10+
11+
include::modules/microshift-firewall-config.adoc[leveloffset=+1]
12+
include::modules/microshift-firewalld-install.adoc[leveloffset=+1]
13+
include::modules/microshift-firewall-req-settings.adoc[leveloffset=+1]
14+
include::modules/microshift-firewall-opt-settings.adoc[leveloffset=+1]
15+
include::modules/microshift-firewall-allow-traffic.adoc[leveloffset=+1]
16+
include::modules/microshift-firewall-apply-settings.adoc[leveloffset=+1]
17+
include::modules/microshift-firewall-verify-settings.adoc[leveloffset=+1]
18+
include::modules/microshift-firewall-known-issue.adoc[leveloffset=+1]
19+
20+
[role="_additional-resources"]
21+
[id="additional-resources_microshift-using-a-firewall"]
22+
.Additional resources
23+
* xref:../microshift_troubleshooting/microshift-troubleshooting.adoc#microshift-ki-cni-iptables-deleted[Troubleshooting iptables deleted].
Lines changed: 8 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
:_content-type: ASSEMBLY
2-
[id="microshift-understanding-networking"]
3-
= Understanding networking
2+
[id="microshift-applying-networking-settings"]
3+
= Understanding networking settings
44
include::_attributes/attributes-microshift.adoc[]
55
:context: microshift-networking
66

@@ -18,21 +18,17 @@ By default, Kubernetes allocates each pod an internal IP address for application
1818

1919
include::modules/microshift-cni.adoc[leveloffset=+1]
2020
include::modules/microshift-configuring-ovn.adoc[leveloffset=+1]
21+
include::modules/microshift-restart-ovnkube-master.adoc[leveloffset=+1]
2122
//include::modules/microshift-man-config-ovs-bridge.adoc[leveloffset=+1]
2223
include::modules/microshift-http-proxy.adoc[leveloffset=+1]
2324
include::modules/microshift-cri-o-container-runtime.adoc[leveloffset=+1]
2425
include::modules/microshift-ovs-snapshot.adoc[leveloffset=+1]
2526
include::modules/microshift-mDNS.adoc[leveloffset=+1]
2627

27-
include::modules/microshift-firewall-config.adoc[leveloffset=+1]
28-
include::modules/microshift-firewalld-install.adoc[leveloffset=+1]
29-
include::modules/microshift-firewall-req-settings.adoc[leveloffset=+1]
30-
include::modules/microshift-firewall-opt-settings.adoc[leveloffset=+1]
31-
include::modules/microshift-firewall-allow-traffic.adoc[leveloffset=+1]
32-
include::modules/microshift-firewall-apply-settings.adoc[leveloffset=+1]
33-
include::modules/microshift-firewall-verify-settings.adoc[leveloffset=+1]
34-
include::modules/microshift-firewall-known-issue.adoc[leveloffset=+1]
35-
3628
[role="_additional-resources"]
29+
[id="additional-resources_microshift-applying-networking-settings"]
3730
.Additional resources
38-
* xref:../microshift_troubleshooting/microshift-troubleshooting.adoc#microshift-version[Troubleshooting].
31+
32+
. xref:../microshift_troubleshooting/microshift-troubleshooting.adoc#microshift-version[Troubleshooting]
33+
. xref:../microshift_troubleshooting/microshift-troubleshooting.adoc#microshift-troubleshooting-nodeport[Troubleshooting the NodePort service].
34+
. xref:../microshift_troubleshooting/microshift-troubleshooting.adoc#microshift-nodeport-unreachable-workaround[NodePort unreachable workround].

modules/microshift-configuring-ovn.adoc

Lines changed: 12 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,9 @@
22
//
33
// * microshift_networking/microshift-networking.adoc
44

5-
:_content-type: PROCEDURE
5+
:_content-type: CONCEPT
66
[id="microshift-config-OVN-K_{context}"]
7-
= Configuring OVN-Kubernetes
7+
= OVN-Kubernetes configuration options
88

99
An OVN-Kubernetes config file can be written to `/etc/microshift/ovn.yaml`. {product-title} will use default OVN-Kubernetes configuration values if an OVN-Kubernetes config file is not customized.
1010

@@ -20,7 +20,7 @@ mtu: 1400
2020
<1> Default value is an empty string, which means "not-specified." The CNI network plugin auto-detects to interface with the default route.
2121
<2> Default value is an empty string, which means disabled.
2222

23-
To customize your configuration, use the following table to find valid values that you can use in your `ovn.yaml` config file.
23+
To customize your configuration, use the following table to find valid values that you can use in your `ovn.yaml` config file:
2424

2525
.Supported optional OVN-Kubernetes configurations for {product-title}.
2626

@@ -36,7 +36,7 @@ To customize your configuration, use the following table to find valid values th
3636
|bool
3737
|false
3838
|Skip configuring OVS bridge `br-ex` in `microshift-ovs-init.service`
39-
|true <1>
39+
|true ^1^
4040

4141
|`ovsInit.gatewayInterface`
4242
|Alpha
@@ -56,8 +56,7 @@ To customize your configuration, use the following table to find valid values th
5656
|MTU value used for the pods
5757
|1300
5858
|===
59-
60-
<1> The OVS bridge is required. When `disableOVSInit` is true, OVS bridge `br-ex` must be configured manually.
59+
^1^ The OVS bridge is required. When `disableOVSInit` is true, OVS bridge `br-ex` must be configured manually.
6160

6261
.Example `ovn.yaml` config file:
6362

@@ -71,4 +70,11 @@ mtu: 1300
7170
----
7271

7372
[IMPORTANT]
73+
====
7474
When `disableOVSInit` is set to true in the `ovn.yaml` config file, the OVS bridge br-ex must be manually configured.
75+
====
76+
77+
[IMPORTANT]
78+
====
79+
If you change the `mtu` configuration value in the `ovn.yaml` file, you must restart the host that {product-title} is running on for the updated setting to apply.
80+
====

modules/microshift-cri-o-container-runtime.adoc

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,11 +4,12 @@
44

55
:_content-type: PROCEDURE
66
[id="microshift-CRI-O-container-engine_{context}"]
7-
= CRI-O container runtime
7+
= Using a proxy in the CRI-O container runtime
88

99
To use an HTTP(S) proxy in `CRI-O`, you need to set the `HTTP_PROXY` and `HTTPS_PROXY` environment variables. You can also set the `NO_PROXY` variable to exclude a list of hosts from being proxied.
1010

1111
.Procedure
12+
1213
. Add the following settings to the `/etc/systemd/system/crio.service.d/00-proxy.conf` file:
1314
+
1415
[source, config]

modules/microshift-firewall-allow-traffic.adoc

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
// Module included in the following assemblies:
22
//
3-
// * microshift_networking/microshift-networking.adoc
3+
// * microshift_networking/microshift-firewall.adoc
44

55
:_content-type: PROCEDURE
66
[id="microshift-firewall-network-traffic_{context}"]
@@ -9,6 +9,7 @@
99
You can allow network traffic through the firewall by first configuring the IP address range with either default or custom values, and then allow internal traffic from pods through the network gateway by inserting the DNS server.
1010

1111
.Procedure
12+
1213
Set the default values or a custom IP address range. After setting the IP address range, allow internal traffic from the pods through the network gateway.
1314

1415
. To set the IP address range:

modules/microshift-firewall-apply-settings.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
// Module included in the following assemblies:
22
//
3-
// * microshift_networking/microshift-networking.adoc
3+
// * microshift_networking/microshift-firewall.adoc
44

55
:_content-type: PROCEDURE
66
[id="microshift-firewall-applying-settings_{context}"]

modules/microshift-firewall-config.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
// Module included in the following assemblies:
22
//
3-
// * microshift_networking/microshift-networking.adoc
3+
// * microshift_networking/microshift-firewall.adoc
44

55
:_content-type: CONCEPT
66
[id="microshift-firewall-config_{context}"]
7-
= Using a firewall
7+
= About network traffic through the firewall
88

9-
Firewalls are not required in {product-title}, but using a firewall can prevent undesired access to the {product-title} API. When using a firewall, you must explicitly allow the following OVN-Kubernetes traffic when the `firewalld` service is running:
9+
When using a firewall, you must explicitly allow the following OVN-Kubernetes traffic when the `firewalld` service is running:
1010

1111
CNI pod to CNI pod::
1212
CNI pod to Host-Network pod

0 commit comments

Comments
 (0)