1
0
mirror of https://github.com/openshift/openshift-docs.git synced 2026-02-05 12:46:18 +01:00

OSDOCS-5274: Restart node when changing mtu value

This commit is contained in:
Shauna Diaz
2023-02-09 12:02:22 -05:00
committed by openshift-cherrypick-robot
parent cf5be4b8cd
commit 720c2fbe08
19 changed files with 125 additions and 127 deletions

View File

@@ -104,8 +104,10 @@ Name: Networking
Dir: microshift_networking
Distros: microshift
Topics:
- Name: Understanding networking
- Name: Applying networking settings
File: microshift-networking
- Name: Using a firewall
File: microshift-firewall
---
Name: Storage
Dir: microshift_storage

View File

@@ -50,12 +50,12 @@ include::modules/microshift-provisioning-ostree.adoc[leveloffset=+1]
[role="_additional-resources_microshift-embed-in-rpm-ostree"]
.Additional resources
. https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html-single/composing_installing_and_managing_rhel_for_edge_images/index[{op-system-ostree} documentation].
. xref:../microshift_install/microshift-install-rpm.adoc#system-requirements-installing-microshift[System requirements for installing {product-title}].
. Red Hat Hybrid Cloud Console link:https://console.redhat.com/openshift/install/pull-secret[pull secret].
. xref:../microshift_networking/microshift-networking.adoc#microshift-firewall-req-settings_microshift-networking[Required firewall settings].
. link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/performing_an_advanced_rhel_8_installation/creating-kickstart-files_installing-rhel-as-an-experienced-user[Creating a Kickstart file].
. link:https://access.redhat.com/solutions/60959[How to embed a Kickstart file into an ISO image].
* link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html-single/composing_installing_and_managing_rhel_for_edge_images/index[{op-system-ostree} documentation].
* xref:../microshift_install/microshift-install-rpm.adoc#system-requirements-installing-microshift[System requirements for installing {product-title}].
* Red Hat Hybrid Cloud Console link:https://console.redhat.com/openshift/install/pull-secret[pull secret].
* xref:../microshift_networking/microshift-firewall.adoc#microshift-firewall-req-settings_microshift-networking[Required firewall settings].
* link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/performing_an_advanced_rhel_8_installation/creating-kickstart-files_installing-rhel-as-an-experienced-user[Creating a Kickstart file].
* link:https://access.redhat.com/solutions/60959[How to embed a Kickstart file into an ISO image].
include::modules/microshift-accessing.adoc[leveloffset=+1]
include::modules/microshift-accessing-cluster-locally.adoc[leveloffset=+2]

View File

@@ -1,87 +0,0 @@
:_content-type: ASSEMBLY
[id="configuring-ingress-microshift"]
= Ingress Operator in {product-title}
include::_attributes/attributes-microshift.adoc[]
:context: configuring-ingress
toc::[]
include::modules/nw-ne-openshift-ingress.adoc[leveloffset=+1]
include::modules/nw-installation-ingress-config-asset.adoc[leveloffset=+1]
include::modules/nw-ingress-controller-configuration-parameters.adoc[leveloffset=+1]
[id="configuring-ingress-controller-tls"]
=== Ingress Controller TLS security profiles
TLS security profiles provide a way for servers to regulate which ciphers a connecting client can use when connecting to the server.
// Understanding TLS security profiles
include::modules/tls-profiles-understanding.adoc[leveloffset=+3]
// Configuring the TLS profile for the Ingress Controller
include::modules/tls-profiles-ingress-configuring.adoc[leveloffset=+3]
include::modules/nw-mutual-tls-auth.adoc[leveloffset=+3]
include::modules/nw-ingress-view.adoc[leveloffset=+1]
include::modules/nw-ingress-operator-status.adoc[leveloffset=+1]
include::modules/nw-ingress-operator-logs.adoc[leveloffset=+1]
include::modules/nw-ingress-controller-status.adoc[leveloffset=+1]
[id="configuring-ingress-controller"]
== Configuring the Ingress Controller
include::modules/nw-ingress-setting-a-custom-default-certificate.adoc[leveloffset=+2]
include::modules/nw-ingress-custom-default-certificate-remove.adoc[leveloffset=+2]
include::modules/nw-autoscaling-ingress-controller.adoc[leveloffset=+2]
include::modules/nw-scaling-ingress-controller.adoc[leveloffset=+2]
include::modules/nw-configure-ingress-access-logging.adoc[leveloffset=+2]
include::modules/nw-ingress-setting-thread-count.adoc[leveloffset=+2]
include::modules/nw-ingress-sharding.adoc[leveloffset=+2]
include::modules/nw-ingress-sharding-route-labels.adoc[leveloffset=+3]
include::modules/nw-ingress-sharding-namespace-labels.adoc[leveloffset=+3]
include::modules/nw-ingress-setting-internal-lb.adoc[leveloffset=+2]
include::modules/nw-ingress-controller-configuration-gcp-global-access.adoc[leveloffset=+2]
include::modules/nw-ingress-controller-config-tuningoptions-healthcheckinterval.adoc[leveloffset=+2]
include::modules/nw-ingress-default-internal.adoc[leveloffset=+2]
include::modules/nw-route-admission-policy.adoc[leveloffset=+2]
include::modules/using-wildcard-routes.adoc[leveloffset=+2]
include::modules/nw-using-ingress-forwarded.adoc[leveloffset=+2]
include::modules/nw-http2-haproxy.adoc[leveloffset=+2]
include::modules/nw-ingress-controller-configuration-proxy-protocol.adoc[leveloffset=+2]
include::modules/nw-ingress-configuring-application-domain.adoc[leveloffset=+2]
include::modules/nw-ingress-converting-http-header-case.adoc[leveloffset=+2]
include::modules/nw-configuring-router-compression.adoc[leveloffset=+2]
include::modules/nw-customize-ingress-error-pages.adoc[leveloffset=+2]
//include::modules/nw-ingress-select-route.adoc[leveloffset=+2]
include::modules/nw-ingress-setting-max-connections.adoc[leveloffset=+2]
//[role="_additional-resources"]
//== Additional resources
//* xref:../networking/configuring-a-custom-pki.adoc#configuring-a-custom-pki[Configuring a custom PKI]

View File

@@ -0,0 +1,23 @@
:_content-type: ASSEMBLY
[id="microshift-using-a-firewall"]
= Using a firewall
include::_attributes/attributes-microshift.adoc[]
:context: microshift-firewall
toc::[]
Firewalls are not required in {product-title}, but using a firewall can prevent undesired access to the {product-title} API.
include::modules/microshift-firewall-config.adoc[leveloffset=+1]
include::modules/microshift-firewalld-install.adoc[leveloffset=+1]
include::modules/microshift-firewall-req-settings.adoc[leveloffset=+1]
include::modules/microshift-firewall-opt-settings.adoc[leveloffset=+1]
include::modules/microshift-firewall-allow-traffic.adoc[leveloffset=+1]
include::modules/microshift-firewall-apply-settings.adoc[leveloffset=+1]
include::modules/microshift-firewall-verify-settings.adoc[leveloffset=+1]
include::modules/microshift-firewall-known-issue.adoc[leveloffset=+1]
[role="_additional-resources"]
[id="additional-resources_microshift-using-a-firewall"]
.Additional resources
* xref:../microshift_troubleshooting/microshift-troubleshooting.adoc#microshift-ki-cni-iptables-deleted[Troubleshooting iptables deleted].

View File

@@ -1,6 +1,6 @@
:_content-type: ASSEMBLY
[id="microshift-understanding-networking"]
= Understanding networking
[id="microshift-applying-networking-settings"]
= Understanding networking settings
include::_attributes/attributes-microshift.adoc[]
:context: microshift-networking
@@ -18,21 +18,17 @@ By default, Kubernetes allocates each pod an internal IP address for application
include::modules/microshift-cni.adoc[leveloffset=+1]
include::modules/microshift-configuring-ovn.adoc[leveloffset=+1]
include::modules/microshift-restart-ovnkube-master.adoc[leveloffset=+1]
//include::modules/microshift-man-config-ovs-bridge.adoc[leveloffset=+1]
include::modules/microshift-http-proxy.adoc[leveloffset=+1]
include::modules/microshift-cri-o-container-runtime.adoc[leveloffset=+1]
include::modules/microshift-ovs-snapshot.adoc[leveloffset=+1]
include::modules/microshift-mDNS.adoc[leveloffset=+1]
include::modules/microshift-firewall-config.adoc[leveloffset=+1]
include::modules/microshift-firewalld-install.adoc[leveloffset=+1]
include::modules/microshift-firewall-req-settings.adoc[leveloffset=+1]
include::modules/microshift-firewall-opt-settings.adoc[leveloffset=+1]
include::modules/microshift-firewall-allow-traffic.adoc[leveloffset=+1]
include::modules/microshift-firewall-apply-settings.adoc[leveloffset=+1]
include::modules/microshift-firewall-verify-settings.adoc[leveloffset=+1]
include::modules/microshift-firewall-known-issue.adoc[leveloffset=+1]
[role="_additional-resources"]
[id="additional-resources_microshift-applying-networking-settings"]
.Additional resources
* xref:../microshift_troubleshooting/microshift-troubleshooting.adoc#microshift-version[Troubleshooting].
. xref:../microshift_troubleshooting/microshift-troubleshooting.adoc#microshift-version[Troubleshooting]
. xref:../microshift_troubleshooting/microshift-troubleshooting.adoc#microshift-troubleshooting-nodeport[Troubleshooting the NodePort service].
. xref:../microshift_troubleshooting/microshift-troubleshooting.adoc#microshift-nodeport-unreachable-workaround[NodePort unreachable workround].

View File

@@ -2,9 +2,9 @@
//
// * microshift_networking/microshift-networking.adoc
:_content-type: PROCEDURE
:_content-type: CONCEPT
[id="microshift-config-OVN-K_{context}"]
= Configuring OVN-Kubernetes
= OVN-Kubernetes configuration options
An OVN-Kubernetes config file can be written to `/etc/microshift/ovn.yaml`. {product-title} will use default OVN-Kubernetes configuration values if an OVN-Kubernetes config file is not customized.
@@ -20,7 +20,7 @@ mtu: 1400
<1> Default value is an empty string, which means "not-specified." The CNI network plugin auto-detects to interface with the default route.
<2> Default value is an empty string, which means disabled.
To customize your configuration, use the following table to find valid values that you can use in your `ovn.yaml` config file.
To customize your configuration, use the following table to find valid values that you can use in your `ovn.yaml` config file:
.Supported optional OVN-Kubernetes configurations for {product-title}.
@@ -36,7 +36,7 @@ To customize your configuration, use the following table to find valid values th
|bool
|false
|Skip configuring OVS bridge `br-ex` in `microshift-ovs-init.service`
|true <1>
|true ^1^
|`ovsInit.gatewayInterface`
|Alpha
@@ -56,8 +56,7 @@ To customize your configuration, use the following table to find valid values th
|MTU value used for the pods
|1300
|===
<1> The OVS bridge is required. When `disableOVSInit` is true, OVS bridge `br-ex` must be configured manually.
^1^ The OVS bridge is required. When `disableOVSInit` is true, OVS bridge `br-ex` must be configured manually.
.Example `ovn.yaml` config file:
@@ -71,4 +70,11 @@ mtu: 1300
----
[IMPORTANT]
====
When `disableOVSInit` is set to true in the `ovn.yaml` config file, the OVS bridge br-ex must be manually configured.
====
[IMPORTANT]
====
If you change the `mtu` configuration value in the `ovn.yaml` file, you must restart the host that {product-title} is running on for the updated setting to apply.
====

View File

@@ -4,11 +4,12 @@
:_content-type: PROCEDURE
[id="microshift-CRI-O-container-engine_{context}"]
= CRI-O container runtime
= Using a proxy in the CRI-O container runtime
To use an HTTP(S) proxy in `CRI-O`, you need to set the `HTTP_PROXY` and `HTTPS_PROXY` environment variables. You can also set the `NO_PROXY` variable to exclude a list of hosts from being proxied.
.Procedure
. Add the following settings to the `/etc/systemd/system/crio.service.d/00-proxy.conf` file:
+
[source, config]

View File

@@ -1,6 +1,6 @@
// Module included in the following assemblies:
//
// * microshift_networking/microshift-networking.adoc
// * microshift_networking/microshift-firewall.adoc
:_content-type: PROCEDURE
[id="microshift-firewall-network-traffic_{context}"]
@@ -9,6 +9,7 @@
You can allow network traffic through the firewall by first configuring the IP address range with either default or custom values, and then allow internal traffic from pods through the network gateway by inserting the DNS server.
.Procedure
Set the default values or a custom IP address range. After setting the IP address range, allow internal traffic from the pods through the network gateway.
. To set the IP address range:

View File

@@ -1,6 +1,6 @@
// Module included in the following assemblies:
//
// * microshift_networking/microshift-networking.adoc
// * microshift_networking/microshift-firewall.adoc
:_content-type: PROCEDURE
[id="microshift-firewall-applying-settings_{context}"]

View File

@@ -1,12 +1,12 @@
// Module included in the following assemblies:
//
// * microshift_networking/microshift-networking.adoc
// * microshift_networking/microshift-firewall.adoc
:_content-type: CONCEPT
[id="microshift-firewall-config_{context}"]
= Using a firewall
= About network traffic through the firewall
Firewalls are not required in {product-title}, but using a firewall can prevent undesired access to the {product-title} API. When using a firewall, you must explicitly allow the following OVN-Kubernetes traffic when the `firewalld` service is running:
When using a firewall, you must explicitly allow the following OVN-Kubernetes traffic when the `firewalld` service is running:
CNI pod to CNI pod::
CNI pod to Host-Network pod

View File

@@ -1,17 +1,16 @@
// Module included in the following assemblies:
//
// * microshift_networking/microshift-networking.adoc
// * microshift_networking/microshift-firewall.adoc
:_content-type: PROCEDURE
[id="microshift-firewall-optional-settings_{context}"]
= Optional port settings
= Using optional port settings
The {product-title} firewall service allows optional port settings.
.Procedure
. To add customized ports to your firewall configuration, use the following command syntax:
* To add customized ports to your firewall configuration, use the following command syntax:
+
[source,terminal]
----

View File

@@ -1,6 +1,6 @@
// Module included in the following assemblies:
//
// * microshift_networking/microshift-networking.adoc
// * microshift_networking/microshift-firewall.adoc
:_content-type: CONCEPT
[id="microshift-firewall-req-settings_{context}"]

View File

@@ -1,6 +1,6 @@
// Module included in the following assemblies:
//
// * microshift_networking/microshift-networking.adoc
// * microshift_networking/microshift-firewall.adoc
:_content-type: PROCEDURE
[id="microshift-firewall-verifying-settings_{context}"]

View File

@@ -1,6 +1,6 @@
// Module included in the following assemblies:
//
// * microshift_configuring/microshift-networking.adoc
// * microshift_networking/microshift-firewall.adoc
:_content-type: PROCEDURE
[id="microshift-firewall-install_{context}"]

View File

@@ -2,6 +2,7 @@
//
// microshift/microshift-install-rpm.adoc
:_content-type: PROCEDURE
[id="preparing-install-microshift-from-rpm-package_{context}"]
= Preparing to install {product-title} from an RPM package

View File

@@ -2,6 +2,7 @@
//
// microshift/microshift-install-rpm.adoc
:_content-type: REFERENCE
[id="system-requirements-installing-microshift"]
= System requirements for installing {product-title}

View File

@@ -1,6 +1,7 @@
// Module included in the following assemblies:
//
// * microshift_troubleshooting/microshift-known-issues.adoc
:_content-type: PROCEDURE
[id="microshift-ki-cni-iptables-deleted_{context}"]
= Reloading the firewall deletes iptable rules
@@ -22,7 +23,7 @@ To troubleshoot this issue, delete the ovnkube-master pod to restart the ovnkube
Run the commands listed in each step that follows to restore the iptable rules.
. Stop the ovn-master application:
. Find the name of the ovnkube-master pod that you want to restart by running the following command:
+
[source, terminal]
----

View File

@@ -6,8 +6,11 @@
[id="microshift-OVS-snapshot_{context}"]
= Getting a snapshot of OVS interfaces from a running cluster
A snapshot represents the state and data of OVS interfaces at a specific point in time.
.Procedure
To see a snapshot of OVS interfaces from a running {product-title} cluster, use the following command:
* To see a snapshot of OVS interfaces from a running {product-title} cluster, use the following command:
[source, terminal]
----

View File

@@ -0,0 +1,51 @@
// Module included in the following assemblies:
//
// * microshift_networking/microshift-networking.adoc
:_content-type: PROCEDURE
[id="microshift-restart-ovnkube-master_{context}"]
= Restarting the ovnkube-master pod
The following procedure restarts the `ovnkube-master` pod.
.Prerequisites
* The OpenShift CLI (`oc`) is installed.
* Access to the cluster as a user with the `cluster-admin` role.
* A cluster installed on infrastructure configured with the OVN-Kubernetes network plugin.
* The KUBECONFIG environment variable is set.
.Procedure
Use the following steps to restart the `ovnkube-master` pod.
. Access the remote cluster by running the following command:
+
[source, terminal]
----
$ export KUBECONFIG=$PWD/kubeconfig
----
. Find the name of the `ovnkube-master` pod that you want to restart by running the following command:
+
[source, terminal]
----
$ pod=$(oc get pods -n openshift-ovn-kubernetes | awk -F " " '/ovnkube-master/{print $1}')
----
. Delete the `ovnkube-master` pod by running the following command:
+
[source, terminal]
----
$ oc -n openshift-ovn-kubernetes delete pod $pod
----
. Confirm that a new `ovnkube-master` pod is running by using the following command:
+
[source, terminal]
----
$ oc get pods -n openshift-ovn-kubernetes
----
The listing of the running pods shows a new `ovnkube-master` pod name and age.
//.Example output needs to be added here