-
Notifications
You must be signed in to change notification settings - Fork 372
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Periodically verify that all required NodePortLocal iptables rules are present in the Node #2210
Comments
This issue is stale because it has been open 180 days with no activity. Remove stale label or comment, or this will be closed in 180 days |
The iptable rules can be deleted by mistake.This patch is used to call a function to ensure that the rules are restored automatically in such a situation. Also integration test was added. fixes antrea-io#2210
The iptables rules can be deleted by mistake. This patch is used to call a function to ensure that the rules are restored automatically in such a situation. Also integration test was added. fixes antrea-io#2210
The iptables rules can be deleted by mistake. This patch is used to call a function to ensure that the rules are restored automatically in such a situation. Also integration test was added. Some fake pod data was taken and some initial iptables rules were added. Rules were deleted and we checked wheteher they were restored periodically. fixes antrea-io#2210
The iptables rules can be deleted by mistake. This patch is used to call a function to ensure that the rules are restored automatically in such a situation. Also integration test was added.It adds some NPL iptables rules, and delete the rules and check if the rules are recovered automatcally. fixes antrea-io#2210
The iptables rules can be deleted by mistake. This patch is used to call a function to ensure that the rules are restored automatically in such a situation. Also integration test was added.It adds some NPL iptables rules, and delete the rules and check if the rules are recovered automatcally. fixes antrea-io#2210
The iptables rules can be deleted by mistake. This patch is used to call a function to ensure that the rules are restored automatically in such a situation. Also integration test was added.It adds some NPL iptables rules, and delete the rules and check if the rules are recovered automatcally. fixes antrea-io#2210
The iptables rules can be deleted by mistake. This patch is used to call a function to ensure that the rules are restored automatically in such a situation. Also integration test was added.It adds some NPL iptables rules, and delete the rules and check if the rules are recovered automatcally. fixes antrea-io#2210
The iptables rules can be deleted by mistake. This patch is used to call a function to ensure that the rules are restored automatically in such a situation. Also integration test was added.It adds some NPL iptables rules, and delete the rules and check if the rules are recovered automatcally. fixes antrea-io#2210
This issue is stale because it has been open 90 days with no activity. Remove stale label or comment, or this will be closed in 90 days |
This issue is stale because it has been open 90 days with no activity. Remove stale label or comment, or this will be closed in 90 days |
This issue is stale because it has been open 90 days with no activity. Remove stale label or comment, or this will be closed in 90 days |
This issue is stale because it has been open 90 days with no activity. Remove stale label or comment, or this will be closed in 90 days |
Describe what you are trying to solve
This issue is similar to #628. In #1751, we added support to periodically sync-up iptables rules. However that PR didn't cover the NodePortLocal iptables rules (https://github.com/antrea-io/antrea/blob/main/pkg/agent/nodeportlocal/rules/iptable_rule.go), probably because PRs were merged at around the same time (v0.13.0 release).
Describe the solution you have in mind
We should add similar logic to periodically verify that all expected NodePortLocal iptables are present.
Describe how your solution impacts user flows
Nothing changes for the user, the Antrea NodePortLocal feature becomes more robust.
Describe the main design/architecture of your solution
There are 2 types of rules:
A new sync method can be added to
antrea/pkg/agent/nodeportlocal/k8s/npl_controller.go
Line 48 in 87c772d
and invoked in a loop from a new goroutine. It can take care of installing both types of routes. Note that for the second type of rules (individual DNAT rules), all the information can be found in
antrea/pkg/agent/nodeportlocal/portcache/port_table.go
Lines 33 to 39 in 87c772d
Test plan
Add an integration test like in #1751 to validate that iptables rules deleted manually are restored automatically.
The text was updated successfully, but these errors were encountered: