-
Notifications
You must be signed in to change notification settings - Fork 380
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Streamlining OVS Driver Installation and Upgrade for Windows Container #6358
Comments
For 1, I just want to confirm my understanding. I assume you are referring to the test-signed driver case, where users have to run If you are referring to what we discussed in #5789 (comment) (also tracked in #5624 (comment)), then it seems you were implying that we could download and install the OVS driver as part of the DaemonSet (not just load the certificate). |
For Issue 1, IMO, It is preferable to streamline certificate installation whether it is signed or unsigned (test-signed),
For issue 2, |
For the user-provided signed OVS driver, I prefer the user should place it into a custom antrea-ovs image to be compatible with our existing DaemonSet manifest. When the DaemonSet starts, it can check for the existence of a certificate in the target path to decide whether to import the existing certificate or generate a new one. What do you think? @antoninbas @wenyingd |
For issue2, |
I don't think this relates to my question? Maybe the confusion comes from the fact that your issue refers to the "unsigned driver" case, but I don't think there is such a thing. Drivers are always signed, but it can be an actual signature or a test signature.
For this case (second row of the table?), I think I agree. At the moment, we tells users they don't need to run |
Got your point, when I mentioned "unsigned driver," I was referring to the "own signed driver" mentioned in the document (I am not sure if there's a more accurate way to express it..). I have updated the relevant description in the issue.
Regarding this proposal, @wenyingd and I have some modifications: we plan to no longer provide users with the option to import their own generated certificate files. Instead, we will run |
Close this issue as #6383 has been merged, thank you for the discussion. |
Describe the problem/challenge you have
I am encountering some challenges with the installation and upgrade of the OVS driver on Windows when OVS is running inside the container. There are two main related issues and I would like to discuss potential solutions or workarounds.
Installation of Own signed OVS Drivers
Currently, we support the automatic installation of signed OVS drivers during running OVS container. However, for the own signed driver, developers are required to manually run Install-OVS.PS1 to import the certificate(https://github.com/gran-vmv/antrea/blob/ipam-e2e-k8s/docs/windows.md#1-optional-install-ovs-provided-by-antrea-or-your-own). To streamline this process, maybe we can potentially automate the certificate import step inside the container. But I am not sure how to efficiently manage and possibly clean up any redundant certificates that may accumulate over time. Also I am not sure if cleaning these certificates is necessary, or how it could be implemented effectively.
Upgrading OVS Drivers on the Same Windows Host
In scenarios where the OVS container image is upgraded on the same Windows host, we currently run
netcfg -q ovsext
to check if the OVS driver is installed.antrea/build/yamls/antrea-windows-with-ovs.yml
Lines 51 to 55 in 023f000
Describe the solution you'd like
I haven't found a good solutions for these two issues yet, want to involve more people for discussion and suggestions. @antoninbas @wenyingd @rajnkamr
The text was updated successfully, but these errors were encountered: