Uploaded image for project: 'OpenShift Bugs'
  1. OpenShift Bugs
  2. OCPBUGS-27336

[IPSEC] Created cluster with ipsec Full mode in manifests, but got ipsecConfig: {} when cluster is up

XMLWordPrintable

    • Quality / Stability / Reliability
    • False
    • Hide

      None

      Show
      None
    • None
    • Important
    • No
    • None
    • None
    • Proposed
    • None
    • None
    • None
    • None
    • None
    • None
    • None
    • None

      Description of problem:

      Version-Release number of selected component (if applicable):

       4.15.0-0.nightly-2024-01-17-011118

      How reproducible:
      Always
       

      Steps to Reproduce:

      1. Create cluster with ipsec full mode enabled in manifests

      defaultNetwork:
      type: OVNKubernetes
      ovnKubernetesConfig:
      ipsecConfig:
      mode: Full

      2. Once the cluster up, check networ.operator

      3.

       

      Actual results:
      It displayed ipsecConfig: {}
      % oc get network.operator -o yaml
      apiVersion: v1
      items:

      • apiVersion: operator.openshift.io/v1
        kind: Network
        metadata:
        creationTimestamp: "2024-01-18T09:05:05Z"
        generation: 123
        name: cluster
        resourceVersion: "34854"
        uid: 2403d5c9-29db-4133-ba09-52e0f0ab1f81
        spec:
        clusterNetwork:
      • cidr: 10.128.0.0/14
        hostPrefix: 23
        defaultNetwork:
        ovnKubernetesConfig:
        egressIPConfig: {}
        gatewayConfig:
        ipv4: {}
        ipv6: {}
        routingViaHost: false
        genevePort: 6081
        ipsecConfig: {}
        mtu: 1314
        policyAuditConfig:
        destination: "null"
        maxFileSize: 50
        maxLogFiles: 5
        rateLimit: 20
        syslogFacility: local0
        type: OVNKubernetes
        deployKubeProxy: false
        disableMultiNetwork: false
        disableNetworkDiagnostics: false
        logLevel: Normal
        managementState: Managed
        observedConfig: null
        operatorLogLevel: Normal
        serviceNetwork:
      • 172.30.0.0/16
        unsupportedConfigOverrides: null
        useMultiNetworkPolicy: false
         

      Expected results:
      Should display
      ipsecConfig:
      mode: Full
       

      Additional info:

      Please fill in the following template while reporting a bug and provide as much relevant information as possible. Doing so will give us the best chance to find a prompt resolution.

      Affected Platforms:

      Is it an

      1. internal CI failure 
      2. customer issue / SD
      3. internal RedHat testing failure

       

      If it is an internal RedHat testing failure:

      • Please share a kubeconfig or creds to a live cluster for the assignee to debug/troubleshoot along with reproducer steps (specially if it's a telco use case like ICNI, secondary bridges or BM+kubevirt).

       

      If it is a CI failure:

       

      • Did it happen in different CI lanes? If so please provide links to multiple failures with the same error instance
      • Did it happen in both sdn and ovn jobs? If so please provide links to multiple failures with the same error instance
      • Did it happen in other platforms (e.g. aws, azure, gcp, baremetal etc) ? If so please provide links to multiple failures with the same error instance
      • When did the failure start happening? Please provide the UTC timestamp of the networking outage window from a sample failure run
      • If it's a connectivity issue,
      • What is the srcNode, srcIP and srcNamespace and srcPodName?
      • What is the dstNode, dstIP and dstNamespace and dstPodName?
      • What is the traffic path? (examples: pod2pod? pod2external?, pod2svc? pod2Node? etc)

       

      If it is a customer / SD issue:

       

      • Provide enough information in the bug description that Engineering doesn’t need to read the entire case history.
      • Don’t presume that Engineering has access to Salesforce.
      • Please provide must-gather and sos-report with an exact link to the comment in the support case with the attachment.  The format should be: https://access.redhat.com/support/cases/#/case/<case number>/discussion?attachmentId=<attachment id>
      • Describe what each attachment is intended to demonstrate (failed pods, log errors, OVS issues, etc).  
      • Referring to the attached must-gather, sosreport or other attachment, please provide the following details:
        • If the issue is in a customer namespace then provide a namespace inspect.
        • If it is a connectivity issue:
          • What is the srcNode, srcNamespace, srcPodName and srcPodIP?
          • What is the dstNode, dstNamespace, dstPodName and  dstPodIP?
          • What is the traffic path? (examples: pod2pod? pod2external?, pod2svc? pod2Node? etc)
          • Please provide the UTC timestamp networking outage window from must-gather
          • Please provide tcpdump pcaps taken during the outage filtered based on the above provided src/dst IPs
        • If it is not a connectivity issue:
          • Describe the steps taken so far to analyze the logs from networking components (cluster-network-operator, OVNK, SDN, openvswitch, ovs-configure etc) and the actual component where the issue was seen based on the attached must-gather. Please attach snippets of relevant logs around the window when problem has happened if any.
      • For OCPBUGS in which the issue has been identified, label with “sbr-triaged”
      • For OCPBUGS in which the issue has not been identified and needs Engineering help for root cause, labels with “sbr-untriaged”
      • Note: bugs that do not meet these minimum standards will be closed with label “SDN-Jira-template”

              bbennett@redhat.com Ben Bennett
              huirwang Huiran Wang
              None
              None
              Anurag Saxena Anurag Saxena
              None
              Votes:
              0 Vote for this issue
              Watchers:
              2 Start watching this issue

                Created:
                Updated:
                Resolved: