1
0
mirror of https://github.com/openshift/installer.git synced 2026-02-05 06:46:36 +01:00

20 Commits

Author SHA1 Message Date
Martin André
1064621394 OCPBUGS-39402: Fix IPv6 security group rule for schedulable master
There was a typo and we were trying to match an IPv6 network for remote
IP prefix instead of an IPv6 one.
2024-09-03 15:54:48 +02:00
Roman Dobosz
aae81ab501 OCPBUGS-33973: Openstack UPI - Reintroduce unique resource names.
We experienced issues caused by network resources created with the same
name, which makes ansible playbooks to behave differently.

Due to fact, that there is not yet OpenShift infraID accessible on the
stage of creating network resources, there is a need to create
deployment unique identifier in some other way. This patch implements
generating such identifier independent from OpenShift deployment id.

Co-authored-by: Maysa De Macedo Souza <maysa.macedo95@gmail.com>
2024-07-09 09:32:52 +02:00
Maysa Macedo
8d334f05dd OpenStack: enable 30000:32767 nodePort IPv6 traffic
To make nodePort type Service work fine we need to enable
the well known 30000:32767 traffic range.
2024-03-21 12:35:59 -03:00
Roman Dobosz
39f4d26d92 OCPBUGS-25132: Fixes for the OpensStack UPI playbooks.
This commit changes `ether_type` field to `ethertype` so it will not
break on older ansible openstack collections.
Also, fixed condition for IPv6 block.
2023-12-13 11:40:00 +01:00
Roman Dobosz
792a0cf79e OpenStack: Determine dualstack installation by value
Check os_subnet6 instead of os_subnet6_range to determine dual-stack
installation in UPI playbooks.
2023-11-27 14:12:01 -03:00
Roman Dobosz
20651acde8 OpenStack: Improve security groups playbook.
All the IPv6 security group related tasks has been moved to dedicated
block. There was added IPv6 rules for the master security groups in case
masters are set to be scheduable. And finally, fixed conditions for IPv6
tasks.
2023-11-23 11:25:13 -03:00
openshift-ci[bot]
c59a8249f3 Merge pull request #7576 from shiftstack/upi-compact-clusters
OCPBUGS-20403: OpenStack: add SG rules for compact clusters on UPI
2023-11-01 17:28:31 +00:00
Maysa Macedo
560e318f22 OpenStack: add SG rules for compact clusters on UPI
Compact clusters have been supported for a while in IPI.
To also allow compact clusters on UPI, the security group rules
for UPI should be adapted enabling the same ingress traffic
that is enabled for workers.
2023-10-29 23:01:09 -03:00
openshift-ci[bot]
5d0755fe94 Merge pull request #7552 from shiftstack/upi-ds
openstack: dual stack UPI - create security group rules for IPv6
2023-10-24 18:29:38 +00:00
Roman Dobosz
d2434f526a openstack: dual stack UPI - create security group rules for IPv6.
OSASINFRA-3142
2023-10-24 11:30:07 +02:00
Michał Dulko
5055de718a OpenStack: Remove NodePorts range 0.0.0.0/0 rules
With openshift/cluster-cloud-controller-manager-operator#264 we should
no longer need the SG rules opening whole NodePorts range by default.
cloud-provider-openstack will manage this on its own now.

We still need to keep the rules opening the traffic inside the cluster
to make sure traffic redirections and regular NodePort services work.
2023-08-16 18:17:26 +02:00
Emilien Macchi
aa258c01ab openstack/upi: add missing modules namespaces 2023-07-28 13:08:18 -04:00
atiratree
a7040d4004 Revert "open cluster-policy-controller ports for metrics"
This reverts commit 2636aef6cd.
2021-12-06 15:13:52 +01:00
atiratree
2636aef6cd open cluster-policy-controller ports for metrics 2021-09-29 17:32:51 +02:00
Michał Dulko
bb4ff28b04 OpenStack UPI: Open 0.0.0.0/0 on NodePorts
This is to make sure that with OVN LBs we accept traffic from outside
the cluster into a LoadBalancer service.
2021-07-06 15:11:02 +02:00
Martin André
c2680c5220 Bug 1946506: Remove security group rules for mdns
Bootstrapping no longer uses mdns for node resolution, we can remove the
security group rules for mdns.

These rules where only defined for OpenStack plaform. This commit
removes the rules for both UPI and IPI.
2021-04-06 11:40:55 +02:00
Emilien Macchi
57176fdbc2 Bug 1873079: openstack: restrict SSH to machineNetwork CIDR
TL;DR: SSH shouldn't be exposed to the public by default and if an
operator explicitly wants it, they should do it by modifying the
security group on day 2.

Reasons to not open SSH to all networks:

* SSH to an OCP cluster should be done only by advanced operators and
  shouldn't be encouraged, therefore not open by default that easily. Instead, an experienced operator should make configuration changes via `machineconfig` objects.

* Operators who know what they do should reach the nodes from a secure
  network (e.g. provider network or tenant network, ie internal). Not
  from a public network (e.g. Internet or any public faced networked).

* Other cloud providers don't allow SSH from 0.0.0.0/0, we shouldn't be
  the one doing it.

* Running `oc debug` doesn't require SSH to be open from the client.

Signed-off-by: Emilien Macchi <emilien@redhat.com>
2021-02-16 11:23:05 -05:00
Mark Gray
618d4ef474 Bug 1916373: upi: allow IPsec ports 2021-01-14 15:31:30 -05:00
Pierre Prinetti
46f78430e3 openstack UPI: Replace remote_group_id in SGs
OpenStack with OVS has an issue where security groups using
remote_group_id can be very slow, leading to OVS dropping packets.

https://bugzilla.redhat.com/show_bug.cgi?id=1703947

Use remote_ip_prefix instead to work around the issue.
2020-04-17 15:45:07 +02:00
Maysa Macedo
7073901386 Fix playbooks names
Having playbooks names with numbers can be misleading,
as the the down playbooks are not triggered on the order
indicated on the playbook name.
2020-04-07 10:10:35 +02:00