Bug 1961064
Summary: | Documentation link to network policies is outdated | |||
---|---|---|---|---|
Product: | OpenShift Container Platform | Reporter: | Joel Takvorian <jtakvori> | |
Component: | Management Console | Assignee: | Joel Takvorian <jtakvori> | |
Status: | CLOSED ERRATA | QA Contact: | Xiyun Zhao <xiyuzhao> | |
Severity: | medium | Docs Contact: | ||
Priority: | medium | |||
Version: | 4.7 | CC: | aos-bugs, jokerman, yapei | |
Target Milestone: | --- | |||
Target Release: | 4.8.0 | |||
Hardware: | Unspecified | |||
OS: | Unspecified | |||
Whiteboard: | ||||
Fixed In Version: | Doc Type: | No Doc Update | ||
Doc Text: | Story Points: | --- | ||
Clone Of: | ||||
: | 1963025 (view as bug list) | Environment: | ||
Last Closed: | 2021-07-27 23:08:44 UTC | Type: | Bug | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: | ||||
Bug Depends On: | ||||
Bug Blocks: | 1963025 |
Description
Joel Takvorian
2021-05-17 07:10:19 UTC
This bug has been fixed and verified on payload 4.8.0-0.nightly-2021-05-21-233425 Pre-condition 1. Create a network policy Verify step: 1. Go to Networking-> Networkpolicy details page 2. Verify if the link of "NetworkPolicies documentation" can be redirect to "<Base URL of OCP container-platform related version>/networking/network_policy/about-network-policy.html" 3. Verify if the description on Ingress rules part on network policy detail page has been update as below: Pods accept all traffic by default. They can be isolated via NetworkPolicies which specify a whitelist of ingress rules. When a Pod is selected by a NetworkPolicy, it will reject all traffic not explicitly allowed via a NetworkPolicy. See more details in: 4. Add '?pseudolocalization=true&lng=en' at the end of URL 5. Verify if the description and link is shown as i18n format correctly on Ingress rules part on network policy detail page Result: 2. The redirect link of 'NetworkPolicy documentation' has been update to "<Base URL of OCP container-platform related version>/networking/network_policy/about-network-policy.html" 3. The description on Ingress rules part on network policy detail page is update and shown as below Pods accept all traffic by default. They can be isolated via NetworkPolicies which specify a whitelist of ingress rules. When a Pod is selected by a NetworkPolicy, it will reject all traffic not explicitly allowed via a NetworkPolicy. See more details in:<Hyperlink of 'NetworkPolicy documentaition'> 5. The description and link can be translated. [Ṕṓṓḍṡ ααͼͼḛḛṗţ ααḽḽ ţṛααϝϝḭḭͼ ḅẏẏ ḍḛḛϝααṵṵḽţ. Ṫḥḛḛẏẏ ͼααṇ ḅḛḛ ḭḭṡṓṓḽααţḛḛḍ ṽḭḭαα ṄḛḛţẁṓṓṛḳṔṓṓḽḭḭͼḭḭḛḛṡ ẁḥḭḭͼḥ ṡṗḛḛͼḭḭϝẏẏ αα ẁḥḭḭţḛḛḽḭḭṡţ ṓṓϝ ḭḭṇḡṛḛḛṡṡ ṛṵṵḽḛḛṡ. Ŵḥḛḛṇ αα Ṕṓṓḍ ḭḭṡ ṡḛḛḽḛḛͼţḛḛḍ ḅẏẏ αα ṄḛḛţẁṓṓṛḳṔṓṓḽḭḭͼẏẏ, ḭḭţ ẁḭḭḽḽ ṛḛḛĵḛḛͼţ ααḽḽ ţṛααϝϝḭḭͼ ṇṓṓţ ḛḛẋṗḽḭḭͼḭḭţḽẏẏ ααḽḽṓṓẁḛḛḍ ṽḭḭαα αα ṄḛḛţẁṓṓṛḳṔṓṓḽḭḭͼẏẏ. Ṣḛḛḛḛ ṃṓṓṛḛḛ ḍḛḛţααḭḭḽṡ ḭḭṇ: [ṄḛḛţẁṓṓṛḳṔṓṓḽḭḭͼḭḭḛḛṡ ḍṓṓͼṵṵṃḛḛṇţααţḭḭṓṓṇ].] Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Moderate: OpenShift Container Platform 4.8.2 bug fix and security update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2021:2438 |