Bug 1328983 - [RFE] comma delimited list of networks for serviceNetworkCIDR and clusterNetworkCIDR
Summary: [RFE] comma delimited list of networks for serviceNetworkCIDR and clusterNetw...
Keywords:
Status: CLOSED DEFERRED
Alias: None
Product: OpenShift Container Platform
Classification: Red Hat
Component: RFE
Version: 3.2.0
Hardware: Unspecified
OS: Unspecified
unspecified
medium
Target Milestone: ---
: ---
Assignee: Ben Bennett
QA Contact: Johnny Liu
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2016-04-20 19:43 UTC by Ryan Howe
Modified: 2021-12-10 14:38 UTC (History)
12 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2018-03-12 13:54:36 UTC
Target Upstream Version:


Attachments (Terms of Use)

Description Ryan Howe 2016-04-20 19:43:36 UTC
Description:

Requesting the ability to provide a comma delimited list of networks for serviceNetworkCIDR and clusterNetworkCIDR vs a single large network. 

With large infrastructures allocating large /16 networks is hard as internal IP space is limited.  


Looking to set the following in the master-config.yaml file

  clusterNetworkCIDR: 10.1.0.0/24, 10.1.5.0/24, 10.2.1.0/24 ...

Comment 2 Dan Williams 2016-04-21 19:57:30 UTC
The SDN subnet (10.x) only exists within the SDN overlay itself, so those addresses should not leak out of the overlay, and thus won't conflict with anything outside.

Where the conflict could happen is on each node, since the tun0 port has a route to the cluster network subnet (eg, 10.x/16).  So if the network which the nodes are connected to is 10.x, there will obviously be problems as both tun0 and eth0 will have addresses and routes in the 10.x space.  That's typically fixed by moving the OpenShift cluster to a different subnet (172.16) or making the OpenShift cluster network smaller than /16.

To be clear; setting up OpenShift doesn't require reserving a /16 from an internal network or anything, because none of the pods that receive an address from this space are actually exposed to the organization's network; they are all NAT-ed to the node's eth0 IP address.  But if you're running other stuff on the node itself or if the pods need to access other non-OpenShift resources, then the IP range of those external resources cannot overlap with the OpenShift SDN cluster network range.

Ryan, can you provide more information about what problems people are running into currently with address conflicts?

Comment 9 Eric Rich 2018-03-12 13:54:36 UTC
This bug has been identified as a dated (created more than 3 months ago) bug. 
This bug has been triaged (has a trello card linked to it), or reviewed by Engineering/PM and has been put into the product backlog, 
however this bug has not been slated for a currently planned release (3.9, 3.10 or 3.11), which cover our releases for the rest of the calendar year. 

As a result of this bugs age, state on the current roadmap and PM Score (being below 70), this bug is being Closed - Differed, 
as it is currently not part of the products immediate priorities.

Please see: https://docs.google.com/document/d/1zdqF4rB3ea8GmVIZ7qWCVYUaQ7-EexUrQEF0MTwdDkw/edit for more details.


Note You need to log in before you can comment on or make changes to this bug.