-
Notifications
You must be signed in to change notification settings - Fork 456
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Feature Request] Provide option to disable default gateway creation or set handling precedence #4966
Comments
We can add routes in the subnet CRD like this: apiVersion: kubeovn.io/v1
kind: Subnet
metadata:
name: example-subnet
spec:
protocol: IPv4
provider: example.default.ovn
cidrBlock: 192.168.100.0/24
gateway: 192.168.100.1
excludeIps:
- 192.168.100.0..192.168.100.10
namespaces:
- example-namespace
routes:
- dst: 0.0.0.0/0
gw: 192.168.100.254
- dst: 1.1.1.0/24
gw: 192.168.100.1 Routes specified in the What do you think about this implementation? |
Thank you very much for your quick response. Your suggestion is very well-suited to our specific requirements, thank you! It would make a lot of manual route tweaking obsolete in our current environment. If I may add an additional request: we have not found a reliable way to modify a pods DNS server using manifests yet. In the pod annotations, label k8s.v1.cni.cncf.io/network-status specifies a DNS entry, but this value never gets populated. By default, the ovn.kubernetes.io/* labels do not contain a DNS entry either; adding this value manually does not seem to have any effect (which was expected, just an educated guess on our side). From my perspective, adding a DNS entry in the subnet CDR would be a very helpful addition, to support use cases where a custom DNS resolver in a subnet should be queried. I think simple substitution or addition to preexisting values in /etc/resolv.conf (or comparable config files of similar services) should be sufficient. Suggested CRD addition (.spec.dns)
Thanks again for your great support so far! |
Pod's |
How about use the |
hi! my setup is a bit different, but maybe connected to this topic. if i allow NET_ADMIN to the pod, i can drop the default route by hand and add the new default route on net1, but it would be great if i can do this without net admin using the annotations. is it possible? |
@oilbeater: Thank you for the reply, I am actually using this as of right now and it works great using a custom router. However, from my point of view, the creation of a subnet still induces the creation of a logical router on the subnet gateway IP (or the first valid IP of the subnet range if no dedicated gateway is specified) in OVN. My suggestion is to offer a mechanism to prevent the redundant creation of logical routers, as it may cause interference with custom routing handling. Additionally, in most routing scenarios, pods require multiple network interfaces. Therefore, I would really like an option to include the interface in custom route definitions. See the example below (taken from documentation): Thank you again!
|
@tz1112 Thank you for sharing your input. I believe the proposal to add an interface for custom route definition is a valuable enhancement to the current protocol. Regarding your need to create a logical switch without a port link to the router, I fully understand your requirement. However, implementing this would require significant changes to the current system. Since the custom route already offers a way to bypass the gateway, I recommend maintaining the current approach. If we introduce a method to remove the gateway at the subnet level, users might also expect the same capability at the namespace or pod level. Therefore, I suggest implementing this functionality through user-defined webhooks that rely on custom route annotations to meet specific needs. |
Description
In the declaration of a subnet, a gateway can be specified manually. If no value is set for the gateway parameter, the first valid IP address of the specified subnet range seems to be allocated to establish cluster-internal connectivity by default (e.g.: given CIDR 192.168.100.0/24, 192.168.100.1 is allocated unless specified otherwise). In some use cases, manual handling of the gateway is required (for example for integration of custom routing procedures or custom ovn-handling). In these cases it would be helpful to disable the allocation of the default gateway IP, for example by providing an option to set field subnet.spec.gateway to None. Alternatively, it would be helpful to set precedence to custom resources with the same IP as the gateway. Consider the following scenario: If the gateway is set to a specific IP (e.g. 192.168.100.254) and a custom resource in the network is using the same address, network traffic does never reach the custom resource (as traffic is routed to the gateway). For some custom routing procedures, traffic being forwarded to the custom resource is required.
The current workaround in our project is to handle custom routing by propagating an arbitrary gateway to all hosts in the subnet manually, nevertheless the default gateway is still created (either at subnet.spec.gateway or the default .1 address) and responds to requests. This is automatically detected by some applications, which leads to interference with our production workflow. It would help us a lot if there was an option to disable the gateway creation entirely or forward all traffic to a custom resource with the same IP address as the gateway. See the minimal example below with further explanations for details.
Who will benefit from this feature?
People with custom cluster-internal routing requirements
Anything else?
Minimum example:
The text was updated successfully, but these errors were encountered: