Bug 2073137 - LGW: External->Service of type ETP=Cluster doesn't go to the node
Summary: LGW: External->Service of type ETP=Cluster doesn't go to the node
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: OpenShift Container Platform
Classification: Red Hat
Component: Networking
Version: 4.10
Hardware: Unspecified
OS: Unspecified
high
high
Target Milestone: ---
: 4.10.z
Assignee: Surya Seetharaman
QA Contact: elevin
URL:
Whiteboard:
Depends On: 2060159
Blocks:
TreeView+ depends on / blocked
 
Reported: 2022-04-07 17:34 UTC by Surya Seetharaman
Modified: 2022-05-11 10:32 UTC (History)
11 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of: 2060159
Environment:
Last Closed: 2022-05-11 10:31:47 UTC
Target Upstream Version:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Github openshift ovn-kubernetes pull 1026 0 None Merged [release-4.10] Bug 2073137: Fix lgw flows for ingress-svc traffic 2022-04-29 09:38:26 UTC
Red Hat Product Errata RHBA-2022:1690 0 None None None 2022-05-11 10:32:12 UTC

Comment 8 elevin 2022-05-01 09:07:22 UTC
Server Version: 4.10.0-0.nightly-2022-04-30-165345
metallb-operator.4.10.0-202204090935
====================================================

Name:                     service-xtxrb
Namespace:                cni-test
Labels:                   <none>
Annotations:              metallb.universe.tf/address-pool: address-pool
Selector:                 app=nginx1
Type:                     LoadBalancer
IP Family Policy:         SingleStack
IP Families:              IPv4
IP:                       172.30.50.142
IPs:                      172.30.50.142
LoadBalancer Ingress:     3.3.3.1
Port:                     <unset>  80/TCP
TargetPort:               80/TCP
NodePort:                 <unset>  31053/TCP
Endpoints:                10.128.2.27:80
Session Affinity:         None
External Traffic Policy:  Cluster


sh-4.4# tcpdump host 3.3.3.1 -n
dropped privs to tcpdump
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on br-ex, link-type EN10MB (Ethernet), capture size 262144 bytes
09:02:51.924234 IP 172.16.0.1.39156 > 3.3.3.1.http: Flags [S], seq 1910030519, win 29200, options [mss 1460,sackOK,TS val 3055578788 ecr 0,nop,wscale 7], length 0
09:02:51.927386 IP 3.3.3.1.http > 172.16.0.1.39156: Flags [S.], seq 602873933, ack 1910030520, win 26960, options [mss 1360,sackOK,TS val 121965404 ecr 3055578788,nop,wscale 7], length 0
09:02:51.928259 IP 172.16.0.1.39156 > 3.3.3.1.http: Flags [.], ack 1, win 229, options [nop,nop,TS val 3055578793 ecr 121965404], length 0
09:02:51.928431 IP 172.16.0.1.39156 > 3.3.3.1.http: Flags [P.], seq 1:71, ack 1, win 229, options [nop,nop,TS val 3055578793 ecr 121965404], length 70: HTTP: GET / HTTP/1.1
09:02:51.929905 IP 3.3.3.1.http > 172.16.0.1.39156: Flags [.], ack 71, win 211, options [nop,nop,TS val 121965408 ecr 3055578793], length 0
09:02:51.929974 IP 3.3.3.1.http > 172.16.0.1.39156: Flags [.], seq 1:4045, ack 71, win 211, options [nop,nop,TS val 121965408 ecr 3055578793], length 4044: HTTP: HTTP/1.1 200 OK
09:02:51.930028 IP 3.3.3.1.http > 172.16.0.1.39156: Flags [FP.], seq 4045:4292, ack 71, win 211, options [nop,nop,TS val 121965408 ecr 3055578793], length 247: HTTP
09:02:51.930307 IP 172.16.0.1.39156 > 3.3.3.1.http: Flags [.], ack 4293, win 296, options [nop,nop,TS val 3055578795 ecr 121965408], length 0
09:02:51.930504 IP 172.16.0.1.39156 > 3.3.3.1.http: Flags [F.], seq 71, ack 4293, win 296, options [nop,nop,TS val 3055578795 ecr 121965408], length 0
09:02:51.930718 IP 3.3.3.1.http > 172.16.0.1.39156: Flags [.], ack 72, win 211, options [nop,nop,TS val 121965409 ecr 3055578795], length 0

Comment 11 errata-xmlrpc 2022-05-11 10:31:47 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (OpenShift Container Platform 4.10.13 bug fix update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2022:1690


Note You need to log in before you can comment on or make changes to this bug.