-
Story
-
Resolution: Done
-
Blocker
-
None
-
None
-
Product / Portfolio Work
-
None
-
-
False
-
13
-
8
-
None
-
None
-
OpenShift SPLAT - Sprint 274, OpenShift SPLAT - Sprint 275, OpenShift SPLAT - Sprint 276
{}USER STORY:{}
- As an OpenShift engineer, I want to expose the target group attributes related to "Traffic Control" so that users can workaround of hairpin connection issue in private clusters
- As an OpenShift engineer, I want to expose the target group attributes related to "Traffic Control" so that Cluster Ingress Operator can decide when enabling Proxy to the router when deploying private clusters to resolve the hairpin connection issue
{}DESCRIPTION:{}
{}Required:{}
- PR proposing to change the target group attributes for traffic control used to fix the hairpinning traffic on NLB
- e2e tests exercising the configuration
{}Nice to have:{}
...
{}ACCEPTANCE CRITERIA:{}
- PR merged on CCM fixing the hairpinning connection issue by exposing the annotation to configure the traffic control attributes of Target Group
{}ENGINEERING DETAILS:{}
<!--
Any additional information that might be useful for engineers: related
repositories or pull requests, related email threads, GitHub issues or
other online discussions, how to set up any required accounts and/or
environments if applicable, and so on.
-->
- blocks
-
SPLAT-2481 CCM downstream: update cloud-provider-aws with hairpinning traffic fixes
-
- In Progress
-
- duplicates
-
SPLAT-2335 CCM-AWS: PR track <https://github.com/kubernetes/cloud-provider-aws/pull/1214>
-
- Closed
-
- is blocked by
-
SPLAT-2344 [CCM-AWS NLB hairpin]: CCM upstream CI: add CI permissions to allow create/modify TG attributes
-
- Closed
-
-
SPLAT-2335 CCM-AWS: PR track <https://github.com/kubernetes/cloud-provider-aws/pull/1214>
-
- Closed
-
- links to