-
Notifications
You must be signed in to change notification settings - Fork 185
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feat(eos_designs): Add support for directly connected WAN HA #3720
base: devel
Are you sure you want to change the base?
Conversation
ansible_collections/arista/avd/roles/eos_designs/docs/tables/node-type-wan-configuration.md
Outdated
Show resolved
Hide resolved
ansible_collections/arista/avd/roles/eos_designs/docs/tables/node-type-wan-configuration.md
Outdated
Show resolved
Hide resolved
...ections/arista/avd/molecule/eos_designs_unit_tests/intended/configs/cv-pathfinder-edge3A.cfg
Outdated
Show resolved
Hide resolved
@@ -1259,6 +1259,33 @@ $defs: | |||
type: bool | |||
default: true | |||
description: Enable / Disable IPsec over HA path-group when HA is enabled. | |||
ha_interfaces: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this could using dhcp IP addresses (in cloud in particular) so probably we need to change this model to something along the line of
ha_interfaces:
- name:
ip_address: < dhcp | IPv4 >
peer_ip_address: <need an IP to know where to connect, can be the known one allocated by DHCP>
@ClausHolbechArista for further discussion
disadvantage is no pool - so maybe we need to add ip_address: < dhcp | pool | IPv4 >
with default pool
9e81600
to
eb14328
Compare
This pull request has conflicts, please resolve those before we can evaluate the pull request. |
eb14328
to
a5b54b8
Compare
Conflicts have been resolved. A maintainer will review the pull request shortly. |
This pull request has conflicts, please resolve those before we can evaluate the pull request. |
Conflicts have been resolved. A maintainer will review the pull request shortly. |
ansible_collections/arista/avd/plugins/plugin_utils/eos_designs_shared_utils/wan.py
Outdated
Show resolved
Hide resolved
...le_collections/arista/avd/roles/eos_designs/docs/tables/management-flow-tracking-settings.md
Outdated
Show resolved
Hide resolved
ansible_collections/arista/avd/roles/eos_designs/python_modules/underlay/route_maps.py
Outdated
Show resolved
Hide resolved
ansible_collections/arista/avd/roles/eos_designs/python_modules/underlay/route_maps.py
Outdated
Show resolved
Hide resolved
...eos_designs_unit_tests/intended/configs/cv-pathfinder-custom-control-plane-policy-edge-1.cfg
Show resolved
Hide resolved
...ections/arista/avd/molecule/eos_designs_unit_tests/intended/configs/cv-pathfinder-edge2A.cfg
Outdated
Show resolved
Hide resolved
...ections/arista/avd/molecule/eos_designs_unit_tests/intended/configs/cv-pathfinder-edge2A.cfg
Outdated
Show resolved
Hide resolved
route-map RM-BGP-UNDERLAY-PEERS-OUT permit 20 | ||
description Advertise local routes towards LAN | ||
match route-type local |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
we are missing routes learned from an l3_interface or other edge kind of interface with dynamic routing, like a firewall.
Maybe we should set a tag everywhere instead of these route-type matches. It will also be useful for the ospf lan case.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
l3_interface learned route can configure an extra route-map entry right? This may not even be a use case today.
For OSPF we can use the same route-map I think
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Fixed in 9d5e835
...ections/arista/avd/molecule/eos_designs_unit_tests/intended/configs/cv-pathfinder-edge2A.cfg
Outdated
Show resolved
Hide resolved
...ections/arista/avd/molecule/eos_designs_unit_tests/intended/configs/cv-pathfinder-edge2A.cfg
Outdated
Show resolved
Hide resolved
This pull request has conflicts, please resolve those before we can evaluate the pull request. |
Conflicts have been resolved. A maintainer will review the pull request shortly. |
Quality Gate passedIssues Measures |
@@ -215,14 +215,6 @@ route-map RM-BGP-UNDERLAY-PEERS-IN permit 40 | |||
description Mark prefixes originated from the LAN | |||
set extcommunity soo 192.168.42.1:511 additive | |||
! | |||
route-map RM-BGP-UNDERLAY-PEERS-OUT permit 10 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
breaking change -> we should warn every one we know using this.
@@ -215,14 +215,6 @@ route-map RM-BGP-UNDERLAY-PEERS-IN permit 40 | |||
description Mark prefixes originated from the LAN | |||
set extcommunity soo 192.168.42.1:511 additive | |||
! | |||
route-map RM-BGP-UNDERLAY-PEERS-OUT permit 10 | |||
description Advertise local routes towards LAN | |||
match extcommunity ECL-EVPN-SOO |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
add limitation regading route from eBGP peer in VRF default not advertised to the WAN - TODO
route-map RM-BGP-UNDERLAY-PEERS-OUT permit 40 | ||
description Advertise WAN HA prefixes towards LAN | ||
match ip address prefix-list PL-WAN-HA-PREFIXES | ||
description Permit every other valid route |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
description Permit every other valid route |
This pull request has conflicts, please resolve those before we can evaluate the pull request. |
Conflicts have been resolved. A maintainer will review the pull request shortly. |
This pull request has conflicts, please resolve those before we can evaluate the pull request. |
NOTE blocked by #4107
Change Summary
This PR contains
Pros of iBGP EVPN session:
PLEASE refer to internal documentation
Related Issue(s)
Discussion with CV Pathfinder team
Component(s) name
arista.avd.eos_designs
Proposed changes
cf summary
How to test
molecule + lab
Checklist
User Checklist
To discuss with reviewers
-> only one direct link approved
Repository Checklist