Bug 1762298
Summary: | kube-proxy fix for spurious connection resets | |||
---|---|---|---|---|
Product: | OpenShift Container Platform | Reporter: | Dan Winship <danw> | |
Component: | Networking | Assignee: | Dan Winship <danw> | |
Networking sub component: | openshift-sdn | QA Contact: | zhaozhanqi <zzhao> | |
Status: | CLOSED ERRATA | Docs Contact: | ||
Severity: | unspecified | |||
Priority: | unspecified | CC: | vjaypurk | |
Version: | 3.11.0 | |||
Target Milestone: | --- | |||
Target Release: | 4.3.0 | |||
Hardware: | Unspecified | |||
OS: | Unspecified | |||
Whiteboard: | ||||
Fixed In Version: | Doc Type: | Bug Fix | ||
Doc Text: |
Cause: In clusters with high network traffic where some packets are getting dropped, a previously-working connection to a service might suddenly fail with a "Connection reset by peer" error.
Consequence: Clients would need to reconnect and retry; transferring large amounts of data might be difficult.
Fix: An update was made to the iptables rules so they will handle TCP retransmits correctly.
Result: Connections that have been successfully established will remain established until they are closed.
|
Story Points: | --- | |
Clone Of: | ||||
: | 1762300 1762301 1768436 (view as bug list) | Environment: | ||
Last Closed: | 2020-01-23 11:07:48 UTC | Type: | Bug | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: | ||||
Bug Depends On: | ||||
Bug Blocks: | 1762300, 1762301, 1768436 |
Description
Dan Winship
2019-10-16 13:06:07 UTC
Weird. I'd swear I set this to Version: 3.11.0, Target Release 4.3.0, but somehow it ended up with Version: 3.9.0, Target Release 4.2.z. This is already fixed in 4.3, and there is no useful QE that can be done (other than verifying that it didn't break anything else, which has implicitly already happened since the fix has always been in 4.3). Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2020:0062 |