Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Security group rules for worker nodes when octavia_provider is OVN #479

Open
gabriel-samfira opened this issue Jan 15, 2025 · 2 comments
Open

Comments

@gabriel-samfira
Copy link

gabriel-samfira commented Jan 15, 2025

Hi folks,

According to https://cluster-api-openstack.sigs.k8s.io/clusteropenstack/configuration.html#security-groups, when OVN is used as a load balancer, the following spec needs to be used:

managedSecurityGroups:
  workerNodesSecurityGroupRules:
  - remoteIPPrefix: 0.0.0.0/0
    direction: ingress
    etherType: IPv4
    name: Node Port (TCP, anywhere)
    portRangeMin: 30000
    portRangeMax: 32767
    protocol: tcp
  - remoteIPPrefix: 0.0.0.0/0
    direction: ingress
    etherType: IPv4
    name: Node Port (UDP, anywhere)
    portRangeMin: 30000
    portRangeMax: 32767
    protocol: udp

Right now, there is no connectivity when using OVN as a load balancer.

@gabriel-samfira
Copy link
Author

gah. This seems to only have been made available in the main branch of the openstack provider on the 8th of January 😅.

@gabriel-samfira
Copy link
Author

It seems that in the current stable release only allNodesSecurityGroupRules is available adding the above rules there makes the ovn load balancer work, but it applies these rules on all nodes. in theory that shouldn't be a problem if an isolated network is used. the load balancer only exposes 6443 on the control plane node and nothing really listens on 30000-32767 if scheduling is disabled on control plane nodes.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant