Bug 1990175
| Summary: | [Kuryr][4.7] Duplicated egress rule for service network in knp object | ||
|---|---|---|---|
| Product: | OpenShift Container Platform | Reporter: | Robin Cernin <rcernin> |
| Component: | Networking | Assignee: | Robin Cernin <rcernin> |
| Networking sub component: | kuryr | QA Contact: | Itay Matza <imatza> |
| Status: | CLOSED ERRATA | Docs Contact: | |
| Severity: | medium | ||
| Priority: | low | CC: | mdemaced |
| Version: | 4.7 | Keywords: | Triaged |
| Target Milestone: | --- | ||
| Target Release: | 4.7.z | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2021-09-01 18:23:56 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 1991750 | ||
| Bug Blocks: | 1967540 | ||
|
Description
Robin Cernin
2021-08-04 22:36:19 UTC
OpenShift engineering has decided to NOT ship 4.8.6 on 8/23 due to the following issue. https://bugzilla.redhat.com/show_bug.cgi?id=1995785 All the fixes part will be now included in 4.8.7 on 8/30. OpenShift engineering has decided to NOT ship 4.7.25 on 8/24 due to the following issue. https://bugzilla.redhat.com/show_bug.cgi?id=1995785 All the fixes part will be now included in 4.7.26 on 8/31. Verified successfully on the platform: OpenShift on OpenStack with Kuryr. Using the following versions: OSP: RHOS-16.1-RHEL-8-20210804.n.0 OCP: 4.7.0-0.nightly-2021-08-16-204701 Verification description: 1. Created two projects both with kuryr/demo pod exposed by a service on port 80: >(shiftstack) [stack@undercloud-0 ~]$ oc new-project test >(shiftstack) [stack@undercloud-0 ~]$ oc run --image quay.io/kuryr/demo demo >(shiftstack) [stack@undercloud-0 ~]$ oc new-project test2 >(shiftstack) [stack@undercloud-0 ~]$ oc run --image quay.io/kuryr/demo demo2 >(shiftstack) [stack@undercloud-0 ~]$ oc expose pod/demo2 --port 80 --target-port 8080 >(shiftstack) [stack@undercloud-0 ~]$ oc project test >(shiftstack) [stack@undercloud-0 ~]$ oc expose pod/demo --port 80 --target-port 8080 >(shiftstack) [stack@undercloud-0 ~]$ oc -n test get all -o wide >NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES >pod/demo 1/1 Running 0 5m4s 10.128.127.5 ostest-rqbxq-worker-0-h6mvf <none> <none> > >NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR >service/demo ClusterIP 172.30.83.147 <none> 80/TCP 13s run=demo >(shiftstack) [stack@undercloud-0 ~]$ oc -n test2 get all -o wide >NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES >pod/demo2 1/1 Running 0 3m27s 10.128.128.124 ostest-rqbxq-worker-0-h6mvf <none> <none> > >NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR >service/demo2 ClusterIP 172.30.72.68 <none> 80/TCP 2m45s run=demo2 2. Applied NetworkPolicy: >(shiftstack) [stack@undercloud-0 ~]$ cat np.yaml >kind: NetworkPolicy >apiVersion: networking.k8s.io/v1 >metadata: > name: np-bz >spec: > podSelector: > matchLabels: > run: demo > policyTypes: > - Egress > - Ingress > ingress: > - from: > - podSelector: {} > egress: > - to: > - namespaceSelector: {} >(shiftstack) [stack@undercloud-0 ~]$ oc apply -f np.yaml >networkpolicy.networking.k8s.io/np-bz created 3. There are not duplicated egress rules: >(shiftstack) [stack@undercloud-0 ~]$ oc get knp/np-bz -o json | jq .spec >{ > "egressSgRules": [ > { > "sgRule": { > "description": "Kuryr-Kubernetes NetPolicy SG rule", > "direction": "egress", > "ethertype": "IPv4", > "remote_ip_prefix": "10.128.0.0/14" > } > }, > { > "sgRule": { > "description": "Kuryr-Kubernetes NetPolicy SG rule", > "direction": "egress", > "ethertype": "IPv4", > "remote_ip_prefix": "172.30.0.0/15" > } > } > ], > "ingressSgRules": [ > { > "namespace": "test", > "sgRule": { > "description": "Kuryr-Kubernetes NetPolicy SG rule", > "direction": "ingress", > "ethertype": "IPv4", > "remote_ip_prefix": "10.128.126.0/23" > } > }, > { > "sgRule": { > "description": "Kuryr-Kubernetes NetPolicy SG rule", > "direction": "ingress", > "ethertype": "IPv4", > "remote_ip_prefix": "10.196.0.0/16" > } > }, > { > "sgRule": { > "description": "Allow traffic from local namespace service demo", > "direction": "ingress", > "ethertype": "IPv4", > "remote_ip_prefix": "172.30.83.147" > } > } > ], > "podSelector": { > "matchLabels": { > "run": "demo" > } > }, > "policyTypes": [ > "Egress", > "Ingress" > ] >} Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Important: OpenShift Container Platform 4.7.28 security update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2021:3262 |