Bug 1887797

Summary: [CNV][V2V] Default network type is bridge for interface bound to POD network in VMWare migration wizard
Product: OpenShift Container Platform Reporter: Igor Braginsky <ibragins>
Component: Console Kubevirt PluginAssignee: Filip Krepinsky <fkrepins>
Status: CLOSED ERRATA QA Contact: Igor Braginsky <ibragins>
Severity: medium Docs Contact:
Priority: high    
Version: 4.6CC: aos-bugs, cnv-qe-bugs, fdupont, fkrepins, istein, tjelinek, yzamir
Target Milestone: ---   
Target Release: 4.7.0   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Cause: Default pod network had a wrong interface type Fix: Default pod network interface type is set to masquerade
Story Points: ---
Clone Of:
: 1887813 (view as bug list) Environment:
Last Closed: 2021-02-24 15:25:34 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1887813    

Description Igor Braginsky 2020-10-13 11:24:59 UTC
Description of problem: Default network type is bridge for interface bound to POD network. When running wizard user needs to update network setting to masquerading manually


Version-Release number of selected component (if applicable):


How reproducible: 100%


Steps to Reproduce:
1. Run migration wizard from VMWare to CNV
2. Go to the network settings of VM
3. Open NIC that is bound to POD network

Actual results: Bridged network type is selected by default regardless it is not supported


Expected results: Masquerade network type should be default


Additional info:

Comment 1 Fabien Dupont 2020-10-13 12:10:09 UTC
Tomas, is there still time to fix it for CNV 2.5.0?

Comment 2 Tomas Jelinek 2020-10-13 12:21:03 UTC
I'll move it under UI and target 4.6.z

Comment 4 Yaacov Zamir 2020-12-09 08:01:07 UTC
@Igor hi,
We need this verified so we know we can backport the fix to 4.6.z ( BZ1887813 ) do you need help verifying?

Comment 6 Igor Braginsky 2020-12-22 13:17:54 UTC
This bug reproduces on very recent CNV 2.6, I will reopen it.

Comment 7 Filip Krepinsky 2021-01-05 12:15:23 UTC
the original fix focused only on the RHV part. Posted a part 2 for VMware as well.

Igor, can you check the RHV as well once you get to verifying this?

Comment 8 Igor Braginsky 2021-01-05 13:21:15 UTC
Sure, I will validate it as soon as I will get new CNV 2.6 deployed

Comment 10 Igor Braginsky 2021-01-20 14:12:37 UTC
Verified in CNV 2.6, bug is fixed

Comment 12 errata-xmlrpc 2021-02-24 15:25:34 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: OpenShift Container Platform 4.7.0 security, bug fix, and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2020:5633