-
Feature
-
Resolution: Done
-
Critical
-
None
-
Strategic Portfolio Work
-
False
-
-
False
-
OCPSTRAT-848Consistent Ingress/Egress into OpenShift clusters across providers
-
0% To Do, 0% In Progress, 100% Done
-
0
-
Program Call
Feature Overview (aka. Goal Summary)
Add support of NAT Gateways in Azure while deploying OpenShift on this cloud to manage the outbound network traffic and make this the default option for new deployments
Goals (aka. expected user outcomes)
While deploying OpenShift on Azure the Installer will configure NAT Gateways as the default method to handle the outbound network traffic so we can prevent existing issues on SNAT Port Exhaustion issue related to the configured outboundType by default.
Requirements (aka. Acceptance Criteria):
The installer will use the NAT Gateway object from Azure to manage the outbound traffic from OpenShift.
The installer will create a NAT Gateway object per AZ in Azure so the solution is HA.
Questions to Answer (Optional):
Include a list of refinement / architectural questions that may need to be answered before coding can begin. Initial completion during Refinement status.
Background
Using NAT Gateway for egress traffic is the recommended approach from Microsoft
This is also a common ask from different enterprise customers as with the actual solution used by OpenShift for outbound traffic management in Azure they are hitting SNAT Port Exhaustion issues.
Interoperability Considerations
Which other projects and versions in our portfolio does this feature impact? What interoperability test scenarios should be factored by the layered products? Initial completion during Refinement status.
- is cloned by
-
OCPSTRAT-767 Add support to NAT Gateway as outboundType for clusters in Azure (GA)
- Backlog
- relates to
-
RFE-3386 Allow NAT Gateway as outboundType for clusters in Azure
- Accepted