-
Notifications
You must be signed in to change notification settings - Fork 220
Make the ingress operator hostNetwork #235
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: danwinship If they are not already assigned, you can assign the PR to them by writing The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
|
We may want this to go in for 4.1 so it would be good to know if @openshift/sig-network-edge thinks there are any reasons not to |
|
Would really rather get the AWS region from cluster config (openshift/installer#1725) than switch to hostNetwork given the only use case is to get the AWS region... |
|
That makes sense |
|
The other option is for the host to gather this (we already need to query it) and drop it in a file you can mount in and read. Though a downside of this is that mounting a host path would require privileges. |
|
Feel free to close this PR and replace it with an issue / bug / jira card for no longer using the metadata IP. |
but @knobunc says we definitely want to block access to the metadata API for 4.1, so ingress is going to need some fix |
|
What if we go back to the deprecated |
|
See #238 for an alternative. |
|
Replaced by #238 which is less risky. |
|
@ironcladlou: Closed this PR. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
We're considering blocking access from the pod network to the AWS metadata IP by default. Even if we don't do it in openshift-sdn, there may be other network plugins that implement this behavior. (The 169.254.0.0/16 range is supposed to be "link-local", so it's technically incorrect to route traffic for 169.254.169.254 from br0 to eth0.) So this makes the ingress operator run as hostNetwork. (As seen in openshift/origin#22826, the ingress operator is currently the only OpenShift pod that tries to reach the metadata IP from the pod network.)
It's possible that it depends on being non-hostNetwork in some way in which case this will totally break things? Let's see what e2e-aws says...