Bug 2003195 - OVN CNI should ensure host veths are removed
Summary: OVN CNI should ensure host veths are removed
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: OpenShift Container Platform
Classification: Red Hat
Component: Networking
Version: 4.7
Hardware: Unspecified
OS: Unspecified
unspecified
high
Target Milestone: ---
: 4.10.0
Assignee: Tim Rozet
QA Contact: Anurag saxena
URL:
Whiteboard: perfscale-ovn
Depends On:
Blocks: 2004337
TreeView+ depends on / blocked
 
Reported: 2021-09-10 14:56 UTC by Tim Rozet
Modified: 2022-03-10 16:09 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2022-03-10 16:09:11 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Github openshift ovn-kubernetes pull 738 0 None open Bug 2003195: Ensure host interfaces are deleted by CNI 2021-09-13 23:11:17 UTC
Github ovn-org ovn-kubernetes pull 2481 0 None None None 2021-09-10 15:22:23 UTC
Red Hat Product Errata RHSA-2022:0056 0 None None None 2022-03-10 16:09:58 UTC

Description Tim Rozet 2021-09-10 14:56:02 UTC
Description of problem:
Due to https://bugzilla.redhat.com/show_bug.cgi?id=2003193 where veths are leaked onto the host side and never cleaned up, OVS performance suffers. Rather than relying on kubelet/crio to cleanup these ports, the CNI should ensure they are removed.

Comment 5 errata-xmlrpc 2022-03-10 16:09:11 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: OpenShift Container Platform 4.10.3 security update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2022:0056


Note You need to log in before you can comment on or make changes to this bug.