bugfix: fix iptables masquerade local pod traffic error #49
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Pull Request Description
Describe what this PR does / why we need it
Exist iptables rules will masquerade the traffic from remote pods to local pods, which is not supposed to be done.
Does this pull request fix one issue?
NONE
Describe how you did it
Ignore the traffic from remote pods to local pods by container host interface name. To do this, interface name "xxx_h" should be changed to "h_xxx", because iptables cannot recognize interfaces by suffix.
Describe how to verify it
Use tcpdump in overlay pod, the traffic from remote overlay pods to local pods should not be masqueraded anymore.
Special notes for reviews
Only new pod's traffic with "h_xxx" interface will be fixed, old pod with "xxx_h" named host interface should be recreate to fix this issue.