Uploaded image for project: 'OpenShift Bugs'
  1. OpenShift Bugs
  2. OCPBUGS-46148

[release-4.16] IPsec state not cleaned up on the cluster

XMLWordPrintable

    • No
    • False
    • Hide

      None

      Show
      None
    • Release Note Not Required
    • In Progress

      This is a clone of issue OCPBUGS-33656. The following is the description of the original issue:

      While running IPsec e2e tests in the CI, the data plane traffic is not flowing with desired traffic type esp or udp. For example, ipsec mode external, the traffic type seems to seen as esp for EW traffic, but it's supposed to be geneve (udp) taffic.

      Example CI run: https://prow.ci.openshift.org/view/gs/test-platform-results/pr-logs/pull/openshift_release/50687/rehearse-50687-pull-ci-openshift-cluster-network-operator-master-e2e-aws-ovn-ipsec-serial/1789527351734833152

      This issue was reproducible on a local cluster after many attempts and noticed ipsec states are not cleanup on the node which is a residue from previous test run with ipsec full mode.
       
      [peri@sdn-09 origin]$ kubectl get networks.operator.openshift.io cluster -o yaml
      apiVersion: operator.openshift.io/v1
      kind: Network
      metadata:
        creationTimestamp: "2024-05-13T18:55:57Z"
        generation: 1362
        name: cluster
        resourceVersion: "593827"
        uid: 10f804c9-da46-41ee-91d5-37aff920bee4
      spec:
        clusterNetwork:
        - cidr: 10.128.0.0/14
          hostPrefix: 23
        defaultNetwork:
          ovnKubernetesConfig:
            egressIPConfig: {}
            gatewayConfig:
              ipv4: {}
              ipv6: {}
              routingViaHost: false
            genevePort: 6081
            ipsecConfig:
              mode: External
            mtu: 1400
            policyAuditConfig:
              destination: "null"
              maxFileSize: 50
              maxLogFiles: 5
              rateLimit: 20
              syslogFacility: local0
          type: OVNKubernetes
        deployKubeProxy: false
        disableMultiNetwork: false
        disableNetworkDiagnostics: false
        logLevel: Normal
        managementState: Managed
        observedConfig: null
        operatorLogLevel: Normal
        serviceNetwork:
        - 172.30.0.0/16
        unsupportedConfigOverrides: null
        useMultiNetworkPolicy: false
      status:
        conditions:
        - lastTransitionTime: "2024-05-13T18:55:57Z"
          status: "False"
          type: ManagementStateDegraded
        - lastTransitionTime: "2024-05-14T10:13:12Z"
          status: "False"
          type: Degraded
        - lastTransitionTime: "2024-05-13T18:55:57Z"
          status: "True"
          type: Upgradeable
        - lastTransitionTime: "2024-05-14T11:50:26Z"
          status: "False"
          type: Progressing
        - lastTransitionTime: "2024-05-13T18:57:13Z"
          status: "True"
          type: Available
        readyReplicas: 0
        version: 4.16.0-0.nightly-2024-05-08-222442
      [peri@sdn-09 origin]$ oc debug node/worker-0
      Starting pod/worker-0-debug-k6nlm ...
      To use host binaries, run `chroot /host`
      Pod IP: 192.168.111.23
      If you don't see a command prompt, try pressing enter.
      sh-5.1# chroot /host
      sh-5.1# toolbox
      Checking if there is a newer version of registry.redhat.io/rhel9/support-tools available...
      Container 'toolbox-root' already exists. Trying to start...
      (To remove the container and start with a fresh toolbox, run: sudo podman rm 'toolbox-root')
      toolbox-root
      Container started successfully. To exit, type 'exit'.
      [root@worker-0 /]# tcpdump -i enp2s0 -c 1 -v --direction=out esp and src 192.168.111.23 and dst 192.168.111.24
      dropped privs to tcpdump
      tcpdump: listening on enp2s0, link-type EN10MB (Ethernet), snapshot length 262144 bytes
      16:07:01.854214 IP (tos 0x0, ttl 64, id 20451, offset 0, flags [DF], proto ESP (50), length 152)
          worker-0 > worker-1: ESP(spi=0x52cc9c8d,seq=0xe1c5c), length 132
      1 packet captured
      6 packets received by filter
      0 packets dropped by kernel
      [root@worker-0 /]# exit
      exit
       
      sh-5.1# ipsec whack --trafficstatus
      006 #20: "ovn-1184d9-0-in-1", type=ESP, add_time=1715687134, inBytes=206148172, outBytes=0, maxBytes=2^63B, id='@1184d960-3211-45c4-a482-d7b6fe995446'
      006 #19: "ovn-1184d9-0-out-1", type=ESP, add_time=1715687112, inBytes=0, outBytes=40269835, maxBytes=2^63B, id='@1184d960-3211-45c4-a482-d7b6fe995446'
      006 #27: "ovn-185198-0-in-1", type=ESP, add_time=1715687419, inBytes=71406656, outBytes=0, maxBytes=2^63B, id='@185198f6-7dde-4e9b-b2aa-52439d2beef5'
      006 #26: "ovn-185198-0-out-1", type=ESP, add_time=1715687401, inBytes=0, outBytes=17201159, maxBytes=2^63B, id='@185198f6-7dde-4e9b-b2aa-52439d2beef5'
      006 #14: "ovn-922aca-0-in-1", type=ESP, add_time=1715687004, inBytes=116384250, outBytes=0, maxBytes=2^63B, id='@922aca42-b893-496e-bb9b-0310884f4cc1'
      006 #13: "ovn-922aca-0-out-1", type=ESP, add_time=1715686986, inBytes=0, outBytes=986900228, maxBytes=2^63B, id='@922aca42-b893-496e-bb9b-0310884f4cc1'
      006 #6: "ovn-f72f26-0-in-1", type=ESP, add_time=1715686855, inBytes=115781441, outBytes=98, maxBytes=2^63B, id='@f72f2622-e7dc-414e-8369-6013752ea15b'
      006 #5: "ovn-f72f26-0-out-1", type=ESP, add_time=1715686833, inBytes=9320, outBytes=29002449, maxBytes=2^63B, id='@f72f2622-e7dc-414e-8369-6013752ea15b'
      sh-5.1# ip xfrm state; echo ' '; ip xfrm policy
      src 192.168.111.21 dst 192.168.111.23
      proto esp spi 0x7f7ddcf5 reqid 16413 mode transport
      replay-window 0 flag esn
      aead rfc4106(gcm(aes)) 0x6158d9a0f4a28598500e15f81a40ef715502b37ecf979feb11bbc488479c8804598011ee 128
      lastused 2024-05-14 16:07:11
      anti-replay esn context:
      seq-hi 0x0, seq 0x18564, oseq-hi 0x0, oseq 0x0
      replay_window 128, bitmap-length 4
      ffffffff ffffffff ffffffff ffffffff 
      sel src 192.168.111.21/32 dst 192.168.111.23/32 proto udp dport 6081 
      src 192.168.111.23 dst 192.168.111.21
      proto esp spi 0xda57e42e reqid 16413 mode transport
      replay-window 0 flag esn
      aead rfc4106(gcm(aes)) 0x810bebecef77951ae8bb9a46cf53a348a24266df8b57bf2c88d4f23244eb3875e88cc796 128
      anti-replay esn context:
      seq-hi 0x0, seq 0x0, oseq-hi 0x0, oseq 0x0
      replay_window 128, bitmap-length 4
      00000000 00000000 00000000 00000000 
      sel src 192.168.111.23/32 dst 192.168.111.21/32 proto udp sport 6081 
      src 192.168.111.21 dst 192.168.111.23
      proto esp spi 0xf84f2fcf reqid 16417 mode transport
      replay-window 0 flag esn
      aead rfc4106(gcm(aes)) 0x0f242efb072699a0f061d4c941d1bb9d4eb7357b136db85a0165c3b3979e27b00ff20ac7 128
      anti-replay esn context:
      seq-hi 0x0, seq 0x0, oseq-hi 0x0, oseq 0x0
      replay_window 128, bitmap-length 4
      00000000 00000000 00000000 00000000 
      sel src 192.168.111.21/32 dst 192.168.111.23/32 proto udp sport 6081 
      src 192.168.111.23 dst 192.168.111.21
      proto esp spi 0x9523c6ca reqid 16417 mode transport
      replay-window 0 flag esn
      aead rfc4106(gcm(aes)) 0xe075d39b6e53c033f5225f8be48efe537c3ba605cee2f5f5f3bb1cf16b6c53182ecf35f7 128
      lastused 2024-05-14 16:07:11
      anti-replay esn context:
      seq-hi 0x0, seq 0x0, oseq-hi 0x0, oseq 0x10fb2
      replay_window 128, bitmap-length 4
      00000000 00000000 00000000 00000000 
      sel src 192.168.111.23/32 dst 192.168.111.21/32 proto udp dport 6081 
      src 192.168.111.20 dst 192.168.111.23
      proto esp spi 0x459d8516 reqid 16397 mode transport
      replay-window 0 flag esn
      aead rfc4106(gcm(aes)) 0xee778e6db2ce83fa24da3b18e028451bbfcf4259513bca21db832c3023e238a6b55fdacc 128
      lastused 2024-05-14 16:07:13
      anti-replay esn context:
      seq-hi 0x0, seq 0x3ec45, oseq-hi 0x0, oseq 0x0
      replay_window 128, bitmap-length 4
      ffffffff ffffffff ffffffff ffffffff 
      sel src 192.168.111.20/32 dst 192.168.111.23/32 proto udp dport 6081 
      src 192.168.111.23 dst 192.168.111.20
      proto esp spi 0x3142f53a reqid 16397 mode transport
      replay-window 0 flag esn
      aead rfc4106(gcm(aes)) 0x6238fea6dffdd36cbb909f6aab48425ba6e38f9d32edfa0c1e0fc6af8d4e3a5c11b5dfd1 128
      anti-replay esn context:
      seq-hi 0x0, seq 0x0, oseq-hi 0x0, oseq 0x0
      replay_window 128, bitmap-length 4
      00000000 00000000 00000000 00000000 
      sel src 192.168.111.23/32 dst 192.168.111.20/32 proto udp sport 6081 
      src 192.168.111.20 dst 192.168.111.23
      proto esp spi 0xeda1ccb9 reqid 16401 mode transport
      replay-window 0 flag esn
      aead rfc4106(gcm(aes)) 0xef84a90993bd71df9c97db940803ad31c6f7d2e72a367a1ec55b4798879818a6341c38b6 128
      anti-replay esn context:
      seq-hi 0x0, seq 0x0, oseq-hi 0x0, oseq 0x0
      replay_window 128, bitmap-length 4
      00000000 00000000 00000000 00000000 
      sel src 192.168.111.20/32 dst 192.168.111.23/32 proto udp sport 6081 
      src 192.168.111.23 dst 192.168.111.20
      proto esp spi 0x02c3c0dd reqid 16401 mode transport
      replay-window 0 flag esn
      aead rfc4106(gcm(aes)) 0x858ab7326e54b6d888825118724de5f0c0ad772be2b39133c272920c2cceb2f716d02754 128
      lastused 2024-05-14 16:07:13
      anti-replay esn context:
      seq-hi 0x0, seq 0x0, oseq-hi 0x0, oseq 0x26f8e
      replay_window 128, bitmap-length 4
      00000000 00000000 00000000 00000000 
      sel src 192.168.111.23/32 dst 192.168.111.20/32 proto udp dport 6081 
      src 192.168.111.24 dst 192.168.111.23
      proto esp spi 0xc9535b47 reqid 16405 mode transport
      replay-window 0 flag esn
      aead rfc4106(gcm(aes)) 0xd7a83ff4bd6e7704562c597810d509c3cdd4e208daabf2ec074d109748fd1647ab2eff9d 128
      lastused 2024-05-14 16:07:14
      anti-replay esn context:
      seq-hi 0x0, seq 0x53d4c, oseq-hi 0x0, oseq 0x0
      replay_window 128, bitmap-length 4
      ffffffff ffffffff ffffffff ffffffff 
      sel src 192.168.111.24/32 dst 192.168.111.23/32 proto udp dport 6081 
      src 192.168.111.23 dst 192.168.111.24
      proto esp spi 0xb66203c8 reqid 16405 mode transport
      replay-window 0 flag esn
      aead rfc4106(gcm(aes)) 0xc207001a7f1ed7f114b3e327308ddbddc36de5272a11fe0661d03eaecc84b6761c7ec9c4 128
      anti-replay esn context:
      seq-hi 0x0, seq 0x0, oseq-hi 0x0, oseq 0x0
      replay_window 128, bitmap-length 4
      00000000 00000000 00000000 00000000 
      sel src 192.168.111.23/32 dst 192.168.111.24/32 proto udp sport 6081 
      src 192.168.111.24 dst 192.168.111.23
      proto esp spi 0x2e4d4deb reqid 16409 mode transport
      replay-window 0 flag esn
      aead rfc4106(gcm(aes)) 0x91e399d83aa1c2626424b502d4b8dae07d4a170f7ef39f8d1baca8e92b8a1dee210e2502 128
      anti-replay esn context:
      seq-hi 0x0, seq 0x0, oseq-hi 0x0, oseq 0x0
      replay_window 128, bitmap-length 4
      00000000 00000000 00000000 00000000 
      sel src 192.168.111.24/32 dst 192.168.111.23/32 proto udp sport 6081 
      src 192.168.111.23 dst 192.168.111.24
      proto esp spi 0x52cc9c8d reqid 16409 mode transport
      replay-window 0 flag esn
      aead rfc4106(gcm(aes)) 0xb605451f32f5dd7a113cae16e6f1509270c286d67265da2ad14634abccf6c90f907e5c00 128
      lastused 2024-05-14 16:07:14
      anti-replay esn context:
      seq-hi 0x0, seq 0x0, oseq-hi 0x0, oseq 0xe2735
      replay_window 128, bitmap-length 4
      00000000 00000000 00000000 00000000 
      sel src 192.168.111.23/32 dst 192.168.111.24/32 proto udp dport 6081 
      src 192.168.111.22 dst 192.168.111.23
      proto esp spi 0x973119c3 reqid 16389 mode transport
      replay-window 0 flag esn
      aead rfc4106(gcm(aes)) 0x87d13e67b948454671fb8463ec0cd4d9c38e5e2dd7f97cbb8f88b50d4965fb1f21b36199 128
      lastused 2024-05-14 16:07:14
      anti-replay esn context:
      seq-hi 0x0, seq 0x2af9a, oseq-hi 0x0, oseq 0x0
      replay_window 128, bitmap-length 4
      ffffffff ffffffff ffffffff ffffffff 
      sel src 192.168.111.22/32 dst 192.168.111.23/32 proto udp dport 6081 
      src 192.168.111.23 dst 192.168.111.22
      proto esp spi 0x4c3580ff reqid 16389 mode transport
      replay-window 0 flag esn
      aead rfc4106(gcm(aes)) 0x2c09750f51e86d60647a60e15606f8b312036639f8de2d7e49e733cda105b920baade029 128
      lastused 2024-05-14 14:36:43
      anti-replay esn context:
      seq-hi 0x0, seq 0x0, oseq-hi 0x0, oseq 0x1
      replay_window 128, bitmap-length 4
      00000000 00000000 00000000 00000000 
      sel src 192.168.111.23/32 dst 192.168.111.22/32 proto udp sport 6081 
      src 192.168.111.22 dst 192.168.111.23
      proto esp spi 0xa3e469dc reqid 16393 mode transport
      replay-window 0 flag esn
      aead rfc4106(gcm(aes)) 0x1d5c5c232e6fd4b72f3dad68e8a4d523cbd297f463c53602fad429d12c0211d97ae26f47 128
      lastused 2024-05-14 14:18:42
      anti-replay esn context:
      seq-hi 0x0, seq 0xb, oseq-hi 0x0, oseq 0x0
      replay_window 128, bitmap-length 4
      00000000 00000000 00000000 000007ff 
      sel src 192.168.111.22/32 dst 192.168.111.23/32 proto udp sport 6081 
      src 192.168.111.23 dst 192.168.111.22
      proto esp spi 0xdee8476f reqid 16393 mode transport
      replay-window 0 flag esn
      aead rfc4106(gcm(aes)) 0x5895025ce5b192a7854091841c73c8e29e7e302f61becfa3feb44d071ac5c64ce54f5083 128
      lastused 2024-05-14 16:07:14
      anti-replay esn context:
      seq-hi 0x0, seq 0x0, oseq-hi 0x0, oseq 0x1f1a3
      replay_window 128, bitmap-length 4
      00000000 00000000 00000000 00000000 
      sel src 192.168.111.23/32 dst 192.168.111.22/32 proto udp dport 6081 
       
      src 192.168.111.23/32 dst 192.168.111.21/32 proto udp sport 6081 
      dir out priority 1360065 ptype main 
      tmpl src 0.0.0.0 dst 0.0.0.0
      proto esp reqid 16413 mode transport
      src 192.168.111.21/32 dst 192.168.111.23/32 proto udp dport 6081 
      dir in priority 1360065 ptype main 
      tmpl src 0.0.0.0 dst 0.0.0.0
      proto esp reqid 16413 mode transport
      src 192.168.111.23/32 dst 192.168.111.21/32 proto udp dport 6081 
      dir out priority 1360065 ptype main 
      tmpl src 0.0.0.0 dst 0.0.0.0
      proto esp reqid 16417 mode transport
      src 192.168.111.21/32 dst 192.168.111.23/32 proto udp sport 6081 
      dir in priority 1360065 ptype main 
      tmpl src 0.0.0.0 dst 0.0.0.0
      proto esp reqid 16417 mode transport
      src 192.168.111.23/32 dst 192.168.111.20/32 proto udp sport 6081 
      dir out priority 1360065 ptype main 
      tmpl src 0.0.0.0 dst 0.0.0.0
      proto esp reqid 16397 mode transport
      src 192.168.111.20/32 dst 192.168.111.23/32 proto udp dport 6081 
      dir in priority 1360065 ptype main 
      tmpl src 0.0.0.0 dst 0.0.0.0
      proto esp reqid 16397 mode transport
      src 192.168.111.23/32 dst 192.168.111.20/32 proto udp dport 6081 
      dir out priority 1360065 ptype main 
      tmpl src 0.0.0.0 dst 0.0.0.0
      proto esp reqid 16401 mode transport
      src 192.168.111.20/32 dst 192.168.111.23/32 proto udp sport 6081 
      dir in priority 1360065 ptype main 
      tmpl src 0.0.0.0 dst 0.0.0.0
      proto esp reqid 16401 mode transport
      src 192.168.111.23/32 dst 192.168.111.24/32 proto udp sport 6081 
      dir out priority 1360065 ptype main 
      tmpl src 0.0.0.0 dst 0.0.0.0
      proto esp reqid 16405 mode transport
      src 192.168.111.24/32 dst 192.168.111.23/32 proto udp dport 6081 
      dir in priority 1360065 ptype main 
      tmpl src 0.0.0.0 dst 0.0.0.0
      proto esp reqid 16405 mode transport
      src 192.168.111.23/32 dst 192.168.111.24/32 proto udp dport 6081 
      dir out priority 1360065 ptype main 
      tmpl src 0.0.0.0 dst 0.0.0.0
      proto esp reqid 16409 mode transport
      src 192.168.111.24/32 dst 192.168.111.23/32 proto udp sport 6081 
      dir in priority 1360065 ptype main 
      tmpl src 0.0.0.0 dst 0.0.0.0
      proto esp reqid 16409 mode transport
      src 192.168.111.23/32 dst 192.168.111.22/32 proto udp sport 6081 
      dir out priority 1360065 ptype main 
      tmpl src 0.0.0.0 dst 0.0.0.0
      proto esp reqid 16389 mode transport
      src 192.168.111.22/32 dst 192.168.111.23/32 proto udp dport 6081 
      dir in priority 1360065 ptype main 
      tmpl src 0.0.0.0 dst 0.0.0.0
      proto esp reqid 16389 mode transport
      src 192.168.111.23/32 dst 192.168.111.22/32 proto udp dport 6081 
      dir out priority 1360065 ptype main 
      tmpl src 0.0.0.0 dst 0.0.0.0
      proto esp reqid 16393 mode transport
      src 192.168.111.22/32 dst 192.168.111.23/32 proto udp sport 6081 
      dir in priority 1360065 ptype main 
      tmpl src 0.0.0.0 dst 0.0.0.0
      proto esp reqid 16393 mode transport
      src ::/0 dst ::/0 
      socket out priority 0 ptype main 
      src ::/0 dst ::/0 
      socket in priority 0 ptype main 
      src ::/0 dst ::/0 
      socket out priority 0 ptype main 
      src ::/0 dst ::/0 
      socket in priority 0 ptype main 
      src 0.0.0.0/0 dst 0.0.0.0/0 
      socket out priority 0 ptype main 
      src 0.0.0.0/0 dst 0.0.0.0/0 
      socket in priority 0 ptype main 
      src 0.0.0.0/0 dst 0.0.0.0/0 
      socket out priority 0 ptype main 
      src 0.0.0.0/0 dst 0.0.0.0/0 
      socket in priority 0 ptype main 
      src 0.0.0.0/0 dst 0.0.0.0/0 
      socket out priority 0 ptype main 
      src 0.0.0.0/0 dst 0.0.0.0/0 
      socket in priority 0 ptype main 
      src 0.0.0.0/0 dst 0.0.0.0/0 
      socket out priority 0 ptype main 
      src 0.0.0.0/0 dst 0.0.0.0/0 
      socket in priority 0 ptype main 
      src 0.0.0.0/0 dst 0.0.0.0/0 
      socket out priority 0 ptype main 
      src 0.0.0.0/0 dst 0.0.0.0/0 
      socket in priority 0 ptype main 
      src 0.0.0.0/0 dst 0.0.0.0/0 
      socket out priority 0 ptype main 
      src 0.0.0.0/0 dst 0.0.0.0/0 
      socket in priority 0 ptype main 
      src ::/0 dst ::/0 proto ipv6-icmp type 135 
      dir out priority 1 ptype main 
      src ::/0 dst ::/0 proto ipv6-icmp type 135 
      dir fwd priority 1 ptype main 
      src ::/0 dst ::/0 proto ipv6-icmp type 135 
      dir in priority 1 ptype main 
      src ::/0 dst ::/0 proto ipv6-icmp type 136 
      dir out priority 1 ptype main 
      src ::/0 dst ::/0 proto ipv6-icmp type 136 
      dir fwd priority 1 ptype main 
      src ::/0 dst ::/0 proto ipv6-icmp type 136 
      dir in priority 1 ptype main 
      sh-5.1# cat /etc/ipsec.conf 
      # /etc/ipsec.conf - Libreswan 4.0 configuration file
      #
      # see 'man ipsec.conf' and 'man pluto' for more information
      #
      # For example configurations and documentation, see https://libreswan.org/wiki/
       
      config setup
      # If logfile= is unset, syslog is used to send log messages too.
      # Note that on busy VPN servers, the amount of logging can trigger
      # syslogd (or journald) to rate limit messages.
      #logfile=/var/log/pluto.log
      #
      # Debugging should only be used to find bugs, not configuration issues!
      # "base" regular debug, "tmi" is excessive and "private" will log
      # sensitive key material (not available in FIPS mode). The "cpu-usage"
      # value logs timing information and should not be used with other
      # debug options as it will defeat getting accurate timing information.
      # Default is "none"
      # plutodebug="base"
      # plutodebug="tmi"
      #plutodebug="none"
      #
      # Some machines use a DNS resolver on localhost with broken DNSSEC
      # support. This can be tested using the command:
      # dig +dnssec DNSnameOfRemoteServer
      # If that fails but omitting '+dnssec' works, the system's resolver is
      # broken and you might need to disable DNSSEC.
      # dnssec-enable=no
      #
      # To enable IKE and IPsec over TCP for VPN server. Requires at least
      # Linux 5.7 kernel or a kernel with TCP backport (like RHEL8 4.18.0-291)
      # listen-tcp=yes
      # To enable IKE and IPsec over TCP for VPN client, also specify
      # tcp-remote-port=4500 in the client's conn section.
       
      # if it exists, include system wide crypto-policy defaults
      include /etc/crypto-policies/back-ends/libreswan.config
       
      # It is best to add your IPsec connections as separate files
      # in /etc/ipsec.d/
      include /etc/ipsec.d/*.conf
      sh-5.1# cat /etc/ipsec.d/openshift.conf 
      # Generated by ovs-monitor-ipsec...do not modify by hand!
       
       
      config setup
          uniqueids=yes
       
      conn %default
          keyingtries=%forever
          type=transport
          auto=route
          ike=aes_gcm256-sha2_256
          esp=aes_gcm256
          ikev2=insist
       
      conn ovn-f72f26-0-in-1
          left=192.168.111.23
          right=192.168.111.22
          leftid=@cf36db5c-5c54-4329-9141-b83679b18ecc
          rightid=@f72f2622-e7dc-414e-8369-6013752ea15b
          leftcert="ovs_certkey_cf36db5c-5c54-4329-9141-b83679b18ecc"
          leftrsasigkey=%cert
          rightca=%same
          leftprotoport=udp/6081
          rightprotoport=udp
       
      conn ovn-f72f26-0-out-1
          left=192.168.111.23
          right=192.168.111.22
          leftid=@cf36db5c-5c54-4329-9141-b83679b18ecc
          rightid=@f72f2622-e7dc-414e-8369-6013752ea15b
          leftcert="ovs_certkey_cf36db5c-5c54-4329-9141-b83679b18ecc"
          leftrsasigkey=%cert
          rightca=%same
          leftprotoport=udp
          rightprotoport=udp/6081
       
      conn ovn-1184d9-0-in-1
          left=192.168.111.23
          right=192.168.111.20
          leftid=@cf36db5c-5c54-4329-9141-b83679b18ecc
          rightid=@1184d960-3211-45c4-a482-d7b6fe995446
          leftcert="ovs_certkey_cf36db5c-5c54-4329-9141-b83679b18ecc"
          leftrsasigkey=%cert
          rightca=%same
          leftprotoport=udp/6081
          rightprotoport=udp
       
      conn ovn-1184d9-0-out-1
          left=192.168.111.23
          right=192.168.111.20
          leftid=@cf36db5c-5c54-4329-9141-b83679b18ecc
          rightid=@1184d960-3211-45c4-a482-d7b6fe995446
          leftcert="ovs_certkey_cf36db5c-5c54-4329-9141-b83679b18ecc"
          leftrsasigkey=%cert
          rightca=%same
          leftprotoport=udp
          rightprotoport=udp/6081
       
      conn ovn-922aca-0-in-1
          left=192.168.111.23
          right=192.168.111.24
          leftid=@cf36db5c-5c54-4329-9141-b83679b18ecc
          rightid=@922aca42-b893-496e-bb9b-0310884f4cc1
          leftcert="ovs_certkey_cf36db5c-5c54-4329-9141-b83679b18ecc"
          leftrsasigkey=%cert
          rightca=%same
          leftprotoport=udp/6081
          rightprotoport=udp
       
      conn ovn-922aca-0-out-1
          left=192.168.111.23
          right=192.168.111.24
          leftid=@cf36db5c-5c54-4329-9141-b83679b18ecc
          rightid=@922aca42-b893-496e-bb9b-0310884f4cc1
          leftcert="ovs_certkey_cf36db5c-5c54-4329-9141-b83679b18ecc"
          leftrsasigkey=%cert
          rightca=%same
          leftprotoport=udp
          rightprotoport=udp/6081
       
      conn ovn-185198-0-in-1
          left=192.168.111.23
          right=192.168.111.21
          leftid=@cf36db5c-5c54-4329-9141-b83679b18ecc
          rightid=@185198f6-7dde-4e9b-b2aa-52439d2beef5
          leftcert="ovs_certkey_cf36db5c-5c54-4329-9141-b83679b18ecc"
          leftrsasigkey=%cert
          rightca=%same
          leftprotoport=udp/6081
          rightprotoport=udp
       
      conn ovn-185198-0-out-1
          left=192.168.111.23
          right=192.168.111.21
          leftid=@cf36db5c-5c54-4329-9141-b83679b18ecc
          rightid=@185198f6-7dde-4e9b-b2aa-52439d2beef5
          leftcert="ovs_certkey_cf36db5c-5c54-4329-9141-b83679b18ecc"
          leftrsasigkey=%cert
          rightca=%same
          leftprotoport=udp
          rightprotoport=udp/6081
       
      sh-5.1# 

              pepalani@redhat.com Periyasamy Palanisamy
              openshift-crt-jira-prow OpenShift Prow Bot
              Huiran Wang Huiran Wang
              Jaime Caamaño Ruiz
              Votes:
              0 Vote for this issue
              Watchers:
              5 Start watching this issue

                Created:
                Updated: