diff --git a/features.md b/features.md
index 3429d593a68..93b984e394e 100644
--- a/features.md
+++ b/features.md
@@ -12,6 +12,7 @@
| NewOLMCatalogdAPIV1Metas| | | | Enabled | | Enabled |
| NewOLMOwnSingleNamespace| | | | Enabled | | Enabled |
| NewOLMPreflightPermissionChecks| | | | Enabled | | Enabled |
+| NoOverlayMode| | | | | Enabled | Enabled |
| NoRegistryClusterOperations| | | | Enabled | | Enabled |
| NewOLM| | Enabled | | Enabled | | Enabled |
| NewOLMWebhookProviderOpenshiftServiceCA| | Enabled | | Enabled | | Enabled |
diff --git a/features/features.go b/features/features.go
index 00ed74a00ce..d756cad6efc 100644
--- a/features/features.go
+++ b/features/features.go
@@ -195,6 +195,14 @@ var (
enableIn(configv1.Default, configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade).
mustRegister()
+ FeatureGateNoOverlayMode = newFeatureGate("NoOverlayMode").
+ reportProblemsToJiraComponent("Networking/ovn-kubernetes").
+ contactPerson("pliurh").
+ productScope(ocpSpecific).
+ enhancementPR("https://github.com/openshift/enhancements/pull/1859").
+ enableIn(configv1.TechPreviewNoUpgrade).
+ mustRegister()
+
FeatureGateAdditionalRoutingCapabilities = newFeatureGate("AdditionalRoutingCapabilities").
reportProblemsToJiraComponent("Networking/cluster-network-operator").
contactPerson("jcaamano").
diff --git a/openapi/generated_openapi/zz_generated.openapi.go b/openapi/generated_openapi/zz_generated.openapi.go
index 4085b738481..6124759927c 100644
--- a/openapi/generated_openapi/zz_generated.openapi.go
+++ b/openapi/generated_openapi/zz_generated.openapi.go
@@ -952,6 +952,7 @@ func GetOpenAPIDefinitions(ref common.ReferenceCallback) map[string]common.OpenA
"github.com/openshift/api/operator/v1.AuthenticationStatus": schema_openshift_api_operator_v1_AuthenticationStatus(ref),
"github.com/openshift/api/operator/v1.AzureCSIDriverConfigSpec": schema_openshift_api_operator_v1_AzureCSIDriverConfigSpec(ref),
"github.com/openshift/api/operator/v1.AzureDiskEncryptionSet": schema_openshift_api_operator_v1_AzureDiskEncryptionSet(ref),
+ "github.com/openshift/api/operator/v1.BGPManagedConfig": schema_openshift_api_operator_v1_BGPManagedConfig(ref),
"github.com/openshift/api/operator/v1.BootImageSkewEnforcementConfig": schema_openshift_api_operator_v1_BootImageSkewEnforcementConfig(ref),
"github.com/openshift/api/operator/v1.BootImageSkewEnforcementStatus": schema_openshift_api_operator_v1_BootImageSkewEnforcementStatus(ref),
"github.com/openshift/api/operator/v1.CSIDriverConfigSpec": schema_openshift_api_operator_v1_CSIDriverConfigSpec(ref),
@@ -1090,6 +1091,7 @@ func GetOpenAPIDefinitions(ref common.ReferenceCallback) map[string]common.OpenA
"github.com/openshift/api/operator/v1.NetworkMigration": schema_openshift_api_operator_v1_NetworkMigration(ref),
"github.com/openshift/api/operator/v1.NetworkSpec": schema_openshift_api_operator_v1_NetworkSpec(ref),
"github.com/openshift/api/operator/v1.NetworkStatus": schema_openshift_api_operator_v1_NetworkStatus(ref),
+ "github.com/openshift/api/operator/v1.NoOverlayOptions": schema_openshift_api_operator_v1_NoOverlayOptions(ref),
"github.com/openshift/api/operator/v1.NodeDisruptionPolicyClusterStatus": schema_openshift_api_operator_v1_NodeDisruptionPolicyClusterStatus(ref),
"github.com/openshift/api/operator/v1.NodeDisruptionPolicyConfig": schema_openshift_api_operator_v1_NodeDisruptionPolicyConfig(ref),
"github.com/openshift/api/operator/v1.NodeDisruptionPolicySpecAction": schema_openshift_api_operator_v1_NodeDisruptionPolicySpecAction(ref),
@@ -48368,6 +48370,35 @@ func schema_openshift_api_operator_v1_AzureDiskEncryptionSet(ref common.Referenc
}
}
+func schema_openshift_api_operator_v1_BGPManagedConfig(ref common.ReferenceCallback) common.OpenAPIDefinition {
+ return common.OpenAPIDefinition{
+ Schema: spec.Schema{
+ SchemaProps: spec.SchemaProps{
+ Description: "BGPManagedConfig contains configuration options for BGP when routing is \"Managed\".",
+ Type: []string{"object"},
+ Properties: map[string]spec.Schema{
+ "asNumber": {
+ SchemaProps: spec.SchemaProps{
+ Description: "asNumber is the 2-byte or 4-byte Autonomous System Number (ASN) to be used in the generated FRR configuration. It is required when NoOverlayOptions.Routing is \"Managed\". Valid values are 1 to 4294967295.",
+ Default: 0,
+ Type: []string{"integer"},
+ Format: "int64",
+ },
+ },
+ "bgpTopology": {
+ SchemaProps: spec.SchemaProps{
+ Description: "bgpTopology defines the BGP topology to be used. Allowed values are \"fullMesh\". When set to \"fullMesh\", every node deploys a BGP router, forming a BGP full mesh. When omitted, this means the user has no opinion and the platform chooses a reasonable default which is subject to change over time. The current default is \"fullMesh\".",
+ Type: []string{"string"},
+ Format: "",
+ },
+ },
+ },
+ Required: []string{"asNumber"},
+ },
+ },
+ }
+}
+
func schema_openshift_api_operator_v1_BootImageSkewEnforcementConfig(ref common.ReferenceCallback) common.OpenAPIDefinition {
return common.OpenAPIDefinition{
Schema: spec.Schema{
@@ -55712,6 +55743,36 @@ func schema_openshift_api_operator_v1_NetworkStatus(ref common.ReferenceCallback
}
}
+func schema_openshift_api_operator_v1_NoOverlayOptions(ref common.ReferenceCallback) common.OpenAPIDefinition {
+ return common.OpenAPIDefinition{
+ Schema: spec.Schema{
+ SchemaProps: spec.SchemaProps{
+ Description: "NoOverlayOptions contains configuration options for networks operating in no-overlay mode.",
+ Type: []string{"object"},
+ Properties: map[string]spec.Schema{
+ "outboundSNAT": {
+ SchemaProps: spec.SchemaProps{
+ Description: "outboundSNAT defines the SNAT behavior for outbound traffic from pods. Allowed values are \"Enable\" and \"Disable\". When set to \"Enable\", SNAT is performed on outbound traffic from pods. When set to \"Disable\", SNAT is not performed and pod IPs are preserved in outbound traffic. This field is required when the network operates in no-overlay mode.",
+ Default: "",
+ Type: []string{"string"},
+ Format: "",
+ },
+ },
+ "routing": {
+ SchemaProps: spec.SchemaProps{
+ Description: "routing specifies whether the pod network routing is managed by OVN-Kubernetes or users. Allowed values are \"Managed\" and \"Unmanaged\". When set to \"Managed\", OVN-Kubernetes manages the pod network routing configuration through BGP. When set to \"Unmanaged\", users are responsible for configuring the pod network routing. This field is required when the network operates in no-overlay mode.",
+ Default: "",
+ Type: []string{"string"},
+ Format: "",
+ },
+ },
+ },
+ Required: []string{"outboundSNAT", "routing"},
+ },
+ },
+ }
+}
+
func schema_openshift_api_operator_v1_NodeDisruptionPolicyClusterStatus(ref common.ReferenceCallback) common.OpenAPIDefinition {
return common.OpenAPIDefinition{
Schema: spec.Schema{
@@ -56701,11 +56762,30 @@ func schema_openshift_api_operator_v1_OVNKubernetesConfig(ref common.ReferenceCa
Format: "",
},
},
+ "defaultNetworkTransport": {
+ SchemaProps: spec.SchemaProps{
+ Description: "defaultNetworkTransport describes the transport protocol for east-west traffic for the default network. Allowed values are \"NoOverlay\" and \"Geneve\". When set to \"NoOverlay\", the default network operates in no-overlay mode. When set to \"Geneve\", the default network uses Geneve overlay. When omitted, this means the user has no opinion and the platform chooses a reasonable default which is subject to change over time. The current default is \"Geneve\".",
+ Type: []string{"string"},
+ Format: "",
+ },
+ },
+ "defaultNetworkNoOverlayOptions": {
+ SchemaProps: spec.SchemaProps{
+ Description: "defaultNetworkNoOverlayOptions contains configuration for no-overlay mode for the default network. It is required when DefaultNetworkTransport is \"NoOverlay\". When omitted, this means the user does not configure no-overlay mode options.",
+ Ref: ref("github.com/openshift/api/operator/v1.NoOverlayOptions"),
+ },
+ },
+ "bgpManagedConfig": {
+ SchemaProps: spec.SchemaProps{
+ Description: "bgpManagedConfig configures the BGP properties for networks (default network or CUDNs) in no-overlay mode that specify routing=\"Managed\" in their NoOverlayOptions. It is required when DefaultNetworkNoOverlayOptions.Routing is set to \"Managed\". When omitted, this means the user does not configure BGP for managed routing.",
+ Ref: ref("github.com/openshift/api/operator/v1.BGPManagedConfig"),
+ },
+ },
},
},
},
Dependencies: []string{
- "github.com/openshift/api/operator/v1.EgressIPConfig", "github.com/openshift/api/operator/v1.GatewayConfig", "github.com/openshift/api/operator/v1.HybridOverlayConfig", "github.com/openshift/api/operator/v1.IPsecConfig", "github.com/openshift/api/operator/v1.IPv4OVNKubernetesConfig", "github.com/openshift/api/operator/v1.IPv6OVNKubernetesConfig", "github.com/openshift/api/operator/v1.PolicyAuditConfig"},
+ "github.com/openshift/api/operator/v1.BGPManagedConfig", "github.com/openshift/api/operator/v1.EgressIPConfig", "github.com/openshift/api/operator/v1.GatewayConfig", "github.com/openshift/api/operator/v1.HybridOverlayConfig", "github.com/openshift/api/operator/v1.IPsecConfig", "github.com/openshift/api/operator/v1.IPv4OVNKubernetesConfig", "github.com/openshift/api/operator/v1.IPv6OVNKubernetesConfig", "github.com/openshift/api/operator/v1.NoOverlayOptions", "github.com/openshift/api/operator/v1.PolicyAuditConfig"},
}
}
diff --git a/openapi/openapi.json b/openapi/openapi.json
index 978dd447717..848d2953392 100644
--- a/openapi/openapi.json
+++ b/openapi/openapi.json
@@ -28023,6 +28023,25 @@
}
}
},
+ "com.github.openshift.api.operator.v1.BGPManagedConfig": {
+ "description": "BGPManagedConfig contains configuration options for BGP when routing is \"Managed\".",
+ "type": "object",
+ "required": [
+ "asNumber"
+ ],
+ "properties": {
+ "asNumber": {
+ "description": "asNumber is the 2-byte or 4-byte Autonomous System Number (ASN) to be used in the generated FRR configuration. It is required when NoOverlayOptions.Routing is \"Managed\". Valid values are 1 to 4294967295.",
+ "type": "integer",
+ "format": "int64",
+ "default": 0
+ },
+ "bgpTopology": {
+ "description": "bgpTopology defines the BGP topology to be used. Allowed values are \"fullMesh\". When set to \"fullMesh\", every node deploys a BGP router, forming a BGP full mesh. When omitted, this means the user has no opinion and the platform chooses a reasonable default which is subject to change over time. The current default is \"fullMesh\".",
+ "type": "string"
+ }
+ }
+ },
"com.github.openshift.api.operator.v1.BootImageSkewEnforcementConfig": {
"description": "BootImageSkewEnforcementConfig is used to configure how boot image version skew is enforced on the cluster.",
"type": "object",
@@ -32385,6 +32404,26 @@
}
}
},
+ "com.github.openshift.api.operator.v1.NoOverlayOptions": {
+ "description": "NoOverlayOptions contains configuration options for networks operating in no-overlay mode.",
+ "type": "object",
+ "required": [
+ "outboundSNAT",
+ "routing"
+ ],
+ "properties": {
+ "outboundSNAT": {
+ "description": "outboundSNAT defines the SNAT behavior for outbound traffic from pods. Allowed values are \"Enable\" and \"Disable\". When set to \"Enable\", SNAT is performed on outbound traffic from pods. When set to \"Disable\", SNAT is not performed and pod IPs are preserved in outbound traffic. This field is required when the network operates in no-overlay mode.",
+ "type": "string",
+ "default": ""
+ },
+ "routing": {
+ "description": "routing specifies whether the pod network routing is managed by OVN-Kubernetes or users. Allowed values are \"Managed\" and \"Unmanaged\". When set to \"Managed\", OVN-Kubernetes manages the pod network routing configuration through BGP. When set to \"Unmanaged\", users are responsible for configuring the pod network routing. This field is required when the network operates in no-overlay mode.",
+ "type": "string",
+ "default": ""
+ }
+ }
+ },
"com.github.openshift.api.operator.v1.NodeDisruptionPolicyClusterStatus": {
"description": "NodeDisruptionPolicyClusterStatus is the type for the status object, rendered by the controller as a merge of cluster defaults and user provided policies",
"type": "object",
@@ -32901,6 +32940,18 @@
"description": "ovnKubernetesConfig contains the configuration parameters for networks using the ovn-kubernetes network project",
"type": "object",
"properties": {
+ "bgpManagedConfig": {
+ "description": "bgpManagedConfig configures the BGP properties for networks (default network or CUDNs) in no-overlay mode that specify routing=\"Managed\" in their NoOverlayOptions. It is required when DefaultNetworkNoOverlayOptions.Routing is set to \"Managed\". When omitted, this means the user does not configure BGP for managed routing.",
+ "$ref": "#/definitions/com.github.openshift.api.operator.v1.BGPManagedConfig"
+ },
+ "defaultNetworkNoOverlayOptions": {
+ "description": "defaultNetworkNoOverlayOptions contains configuration for no-overlay mode for the default network. It is required when DefaultNetworkTransport is \"NoOverlay\". When omitted, this means the user does not configure no-overlay mode options.",
+ "$ref": "#/definitions/com.github.openshift.api.operator.v1.NoOverlayOptions"
+ },
+ "defaultNetworkTransport": {
+ "description": "defaultNetworkTransport describes the transport protocol for east-west traffic for the default network. Allowed values are \"NoOverlay\" and \"Geneve\". When set to \"NoOverlay\", the default network operates in no-overlay mode. When set to \"Geneve\", the default network uses Geneve overlay. When omitted, this means the user has no opinion and the platform chooses a reasonable default which is subject to change over time. The current default is \"Geneve\".",
+ "type": "string"
+ },
"egressIPConfig": {
"description": "egressIPConfig holds the configuration for EgressIP options.",
"default": {},
diff --git a/operator/v1/types_network.go b/operator/v1/types_network.go
index 111240eecff..2f6f78eda1a 100644
--- a/operator/v1/types_network.go
+++ b/operator/v1/types_network.go
@@ -399,6 +399,11 @@ type OpenShiftSDNConfig struct {
// ovnKubernetesConfig contains the configuration parameters for networks
// using the ovn-kubernetes network project
+// +kubebuilder:validation:XValidation:rule='self.defaultNetworkTransport == "NoOverlay" || !has(self.defaultNetworkNoOverlayOptions)',message="defaultNetworkNoOverlayOptions is only supported for no-overlay networks"
+// +kubebuilder:validation:XValidation:rule='!(self.defaultNetworkTransport == "NoOverlay" && has(self.defaultNetworkNoOverlayOptions) && self.defaultNetworkNoOverlayOptions.routing == "Managed") || has(self.bgpManagedConfig)',message="bgpManagedConfig is required when DefaultNetworkTransport is NoOverlay, DefaultNetworkNoOverlayOptions is set and DefaultNetworkNoOverlayOptions.Routing=\"Managed\""
+// +kubebuilder:validation:XValidation:rule='self.defaultNetworkTransport == oldSelf.defaultNetworkTransport',message="DefaultNetworkTransport field is immutable"
+// +kubebuilder:validation:XValidation:rule='self.defaultNetworkNoOverlayOptions == oldSelf.defaultNetworkNoOverlayOptions',message="defaultNetworkNoOverlayOptions field is immutable"
+// +kubebuilder:validation:XValidation:rule='self.bgpManagedConfig == oldSelf.bgpManagedConfig',message="bgpManagedConfig field is immutable"
type OVNKubernetesConfig struct {
// mtu is the MTU to use for the tunnel interface. This must be 100
// bytes smaller than the uplink mtu.
@@ -468,6 +473,33 @@ type OVNKubernetesConfig struct {
// +openshift:enable:FeatureGate=RouteAdvertisements
// +optional
RouteAdvertisements RouteAdvertisementsEnablement `json:"routeAdvertisements,omitempty"`
+
+ // defaultNetworkTransport describes the transport protocol for east-west traffic for the default network.
+ // Allowed values are "NoOverlay" and "Geneve".
+ // When set to "NoOverlay", the default network operates in no-overlay mode.
+ // When set to "Geneve", the default network uses Geneve overlay.
+ // When omitted, this means the user has no opinion and the platform chooses a reasonable default which is subject to change over time.
+ // The current default is "Geneve".
+ // +openshift:enable:FeatureGate=NoOverlayMode
+ // +kubebuilder:validation:Enum=NoOverlay;Geneve
+ // +kubebuilder:default=Geneve
+ // +optional
+ DefaultNetworkTransport TransportOption `json:"defaultNetworkTransport,omitempty"`
+
+ // defaultNetworkNoOverlayOptions contains configuration for no-overlay mode for the default network.
+ // It is required when DefaultNetworkTransport is "NoOverlay".
+ // When omitted, this means the user does not configure no-overlay mode options.
+ // +openshift:enable:FeatureGate=NoOverlayMode
+ // +optional
+ DefaultNetworkNoOverlayOptions *NoOverlayOptions `json:"defaultNetworkNoOverlayOptions,omitempty"`
+
+ // bgpManagedConfig configures the BGP properties for networks (default network or CUDNs)
+ // in no-overlay mode that specify routing="Managed" in their NoOverlayOptions.
+ // It is required when DefaultNetworkNoOverlayOptions.Routing is set to "Managed".
+ // When omitted, this means the user does not configure BGP for managed routing.
+ // +openshift:enable:FeatureGate=NoOverlayMode
+ // +optional
+ BGPManagedConfig *BGPManagedConfig `json:"bgpManagedConfig,omitempty"`
}
type IPv4OVNKubernetesConfig struct {
@@ -898,3 +930,78 @@ type AdditionalRoutingCapabilities struct {
// +kubebuilder:validation:XValidation:rule="self.all(x, self.exists_one(y, x == y))"
Providers []RoutingCapabilitiesProvider `json:"providers"`
}
+
+// TransportOption is the type for network transport options
+type TransportOption string
+
+// SNATOption is the type for SNAT configuration options
+type SNATOption string
+
+// RoutingOption is the type for routing configuration options
+type RoutingOption string
+
+// BGPTopology is the type for BGP topology configuration
+type BGPTopology string
+
+const (
+ // TransportOptionNoOverlay indicates the network operates in no-overlay mode
+ TransportOptionNoOverlay TransportOption = "NoOverlay"
+ // TransportOptionGeneve indicates the network uses Geneve overlay
+ TransportOptionGeneve TransportOption = "Geneve"
+
+ // SNATEnable indicates outbound SNAT is enabled
+ SNATEnable SNATOption = "Enable"
+ // SNATDisable indicates outbound SNAT is disabled
+ SNATDisable SNATOption = "Disable"
+
+ // RoutingManaged indicates routing is managed by OVN-Kubernetes
+ RoutingManaged RoutingOption = "Managed"
+ // RoutingUnmanaged indicates routing is managed by users
+ RoutingUnmanaged RoutingOption = "Unmanaged"
+
+ // BGPTopologyFullMesh indicates every node deploys a BGP router, forming a BGP full mesh
+ BGPTopologyFullMesh BGPTopology = "fullMesh"
+)
+
+// NoOverlayOptions contains configuration options for networks operating in no-overlay mode.
+type NoOverlayOptions struct {
+ // outboundSNAT defines the SNAT behavior for outbound traffic from pods.
+ // Allowed values are "Enable" and "Disable".
+ // When set to "Enable", SNAT is performed on outbound traffic from pods.
+ // When set to "Disable", SNAT is not performed and pod IPs are preserved in outbound traffic.
+ // This field is required when the network operates in no-overlay mode.
+ // +kubebuilder:validation:Enum=Enable;Disable
+ // +required
+ OutboundSNAT SNATOption `json:"outboundSNAT"`
+
+ // routing specifies whether the pod network routing is managed by OVN-Kubernetes or users.
+ // Allowed values are "Managed" and "Unmanaged".
+ // When set to "Managed", OVN-Kubernetes manages the pod network routing configuration through BGP.
+ // When set to "Unmanaged", users are responsible for configuring the pod network routing.
+ // This field is required when the network operates in no-overlay mode.
+ // +kubebuilder:validation:Enum=Managed;Unmanaged
+ // +required
+ Routing RoutingOption `json:"routing"`
+}
+
+// BGPManagedConfig contains configuration options for BGP when routing is "Managed".
+type BGPManagedConfig struct {
+ // asNumber is the 2-byte or 4-byte Autonomous System Number (ASN)
+ // to be used in the generated FRR configuration. It is required
+ // when NoOverlayOptions.Routing is "Managed".
+ // Valid values are 1 to 4294967295.
+ // +kubebuilder:validation:Minimum=1
+ // +kubebuilder:validation:Maximum=4294967295
+ // +required
+ ASNumber uint32 `json:"asNumber"`
+
+ // bgpTopology defines the BGP topology to be used.
+ // Allowed values are "fullMesh".
+ // When set to "fullMesh", every node deploys a BGP router, forming a BGP full mesh.
+ // When omitted, this means the user has no opinion and the platform chooses a reasonable default which is subject to change over time.
+ // The current default is "fullMesh".
+ // +kubebuilder:validation:Enum=fullMesh
+ // +kubebuilder:default=fullMesh
+ // +optional
+ BGPTopology BGPTopology `json:"bgpTopology,omitempty"`
+}
diff --git a/operator/v1/zz_generated.crd-manifests/0000_70_network_01_networks-CustomNoUpgrade.crd.yaml b/operator/v1/zz_generated.crd-manifests/0000_70_network_01_networks-CustomNoUpgrade.crd.yaml
new file mode 100644
index 00000000000..99a2f552506
--- /dev/null
+++ b/operator/v1/zz_generated.crd-manifests/0000_70_network_01_networks-CustomNoUpgrade.crd.yaml
@@ -0,0 +1,1136 @@
+apiVersion: apiextensions.k8s.io/v1
+kind: CustomResourceDefinition
+metadata:
+ annotations:
+ api-approved.openshift.io: https://github.com/openshift/api/pull/475
+ api.openshift.io/merged-by-featuregates: "true"
+ include.release.openshift.io/ibm-cloud-managed: "true"
+ include.release.openshift.io/self-managed-high-availability: "true"
+ release.openshift.io/feature-set: CustomNoUpgrade
+ name: networks.operator.openshift.io
+spec:
+ group: operator.openshift.io
+ names:
+ kind: Network
+ listKind: NetworkList
+ plural: networks
+ singular: network
+ scope: Cluster
+ versions:
+ - name: v1
+ schema:
+ openAPIV3Schema:
+ description: |-
+ Network describes the cluster's desired network configuration. It is
+ consumed by the cluster-network-operator.
+
+ Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
+ properties:
+ apiVersion:
+ description: |-
+ APIVersion defines the versioned schema of this representation of an object.
+ Servers should convert recognized schemas to the latest internal value, and
+ may reject unrecognized values.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
+ type: string
+ kind:
+ description: |-
+ Kind is a string value representing the REST resource this object represents.
+ Servers may infer this from the endpoint the client submits requests to.
+ Cannot be updated.
+ In CamelCase.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
+ type: string
+ metadata:
+ type: object
+ spec:
+ description: NetworkSpec is the top-level network configuration object.
+ properties:
+ additionalNetworks:
+ description: |-
+ additionalNetworks is a list of extra networks to make available to pods
+ when multiple networks are enabled.
+ items:
+ description: |-
+ AdditionalNetworkDefinition configures an extra network that is available but not
+ created by default. Instead, pods must request them by name.
+ type must be specified, along with exactly one "Config" that matches the type.
+ properties:
+ name:
+ description: |-
+ name is the name of the network. This will be populated in the resulting CRD
+ This must be unique.
+ type: string
+ namespace:
+ description: |-
+ namespace is the namespace of the network. This will be populated in the resulting CRD
+ If not given the network will be created in the default namespace.
+ type: string
+ rawCNIConfig:
+ description: |-
+ rawCNIConfig is the raw CNI configuration json to create in the
+ NetworkAttachmentDefinition CRD
+ type: string
+ simpleMacvlanConfig:
+ description: simpleMacvlanConfig configures the macvlan interface
+ in case of type:NetworkTypeSimpleMacvlan
+ properties:
+ ipamConfig:
+ description: ipamConfig configures IPAM module will be used
+ for IP Address Management (IPAM).
+ properties:
+ staticIPAMConfig:
+ description: staticIPAMConfig configures the static
+ IP address in case of type:IPAMTypeStatic
+ properties:
+ addresses:
+ description: addresses configures IP address for
+ the interface
+ items:
+ description: StaticIPAMAddresses provides IP address
+ and Gateway for static IPAM addresses
+ properties:
+ address:
+ description: address is the IP address in
+ CIDR format
+ type: string
+ gateway:
+ description: gateway is IP inside of subnet
+ to designate as the gateway
+ type: string
+ type: object
+ type: array
+ x-kubernetes-list-type: atomic
+ dns:
+ description: dns configures DNS for the interface
+ properties:
+ domain:
+ description: domain configures the domainname
+ the local domain used for short hostname lookups
+ type: string
+ nameservers:
+ description: nameservers points DNS servers
+ for IP lookup
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: atomic
+ search:
+ description: search configures priority ordered
+ search domains for short hostname lookups
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: atomic
+ type: object
+ routes:
+ description: routes configures IP routes for the
+ interface
+ items:
+ description: StaticIPAMRoutes provides Destination/Gateway
+ pairs for static IPAM routes
+ properties:
+ destination:
+ description: destination points the IP route
+ destination
+ type: string
+ gateway:
+ description: |-
+ gateway is the route's next-hop IP address
+ If unset, a default gateway is assumed (as determined by the CNI plugin).
+ type: string
+ type: object
+ type: array
+ x-kubernetes-list-type: atomic
+ type: object
+ type:
+ description: |-
+ type is the type of IPAM module will be used for IP Address Management(IPAM).
+ The supported values are IPAMTypeDHCP, IPAMTypeStatic
+ type: string
+ type: object
+ master:
+ description: |-
+ master is the host interface to create the macvlan interface from.
+ If not specified, it will be default route interface
+ type: string
+ mode:
+ description: 'mode is the macvlan mode: bridge, private,
+ vepa, passthru. The default is bridge'
+ type: string
+ mtu:
+ description: |-
+ mtu is the mtu to use for the macvlan interface. if unset, host's
+ kernel will select the value.
+ format: int32
+ minimum: 0
+ type: integer
+ type: object
+ type:
+ description: |-
+ type is the type of network
+ The supported values are NetworkTypeRaw, NetworkTypeSimpleMacvlan
+ type: string
+ required:
+ - name
+ type: object
+ type: array
+ x-kubernetes-list-map-keys:
+ - name
+ x-kubernetes-list-type: map
+ additionalRoutingCapabilities:
+ description: |-
+ additionalRoutingCapabilities describes components and relevant
+ configuration providing additional routing capabilities. When set, it
+ enables such components and the usage of the routing capabilities they
+ provide for the machine network. Upstream operators, like MetalLB
+ operator, requiring these capabilities may rely on, or automatically set
+ this attribute. Network plugins may leverage advanced routing
+ capabilities acquired through the enablement of these components but may
+ require specific configuration on their side to do so; refer to their
+ respective documentation and configuration options.
+ properties:
+ providers:
+ description: |-
+ providers is a set of enabled components that provide additional routing
+ capabilities. Entries on this list must be unique. The only valid value
+ is currrently "FRR" which provides FRR routing capabilities through the
+ deployment of FRR.
+ items:
+ description: RoutingCapabilitiesProvider is a component providing
+ routing capabilities.
+ enum:
+ - FRR
+ type: string
+ maxItems: 1
+ minItems: 1
+ type: array
+ x-kubernetes-list-type: atomic
+ x-kubernetes-validations:
+ - rule: self.all(x, self.exists_one(y, x == y))
+ required:
+ - providers
+ type: object
+ clusterNetwork:
+ description: |-
+ clusterNetwork is the IP address pool to use for pod IPs.
+ Some network providers support multiple ClusterNetworks.
+ Others only support one. This is equivalent to the cluster-cidr.
+ items:
+ description: |-
+ ClusterNetworkEntry is a subnet from which to allocate PodIPs. A network of size
+ HostPrefix (in CIDR notation) will be allocated when nodes join the cluster. If
+ the HostPrefix field is not used by the plugin, it can be left unset.
+ Not all network providers support multiple ClusterNetworks
+ properties:
+ cidr:
+ type: string
+ hostPrefix:
+ format: int32
+ minimum: 0
+ type: integer
+ type: object
+ type: array
+ x-kubernetes-list-type: atomic
+ defaultNetwork:
+ description: defaultNetwork is the "default" network that all pods
+ will receive
+ properties:
+ openshiftSDNConfig:
+ description: |-
+ openshiftSDNConfig was previously used to configure the openshift-sdn plugin.
+ DEPRECATED: OpenShift SDN is no longer supported.
+ properties:
+ enableUnidling:
+ description: |-
+ enableUnidling controls whether or not the service proxy will support idling
+ and unidling of services. By default, unidling is enabled.
+ type: boolean
+ mode:
+ description: mode is one of "Multitenant", "Subnet", or "NetworkPolicy"
+ type: string
+ mtu:
+ description: |-
+ mtu is the mtu to use for the tunnel interface. Defaults to 1450 if unset.
+ This must be 50 bytes smaller than the machine's uplink.
+ format: int32
+ minimum: 0
+ type: integer
+ useExternalOpenvswitch:
+ description: |-
+ useExternalOpenvswitch used to control whether the operator would deploy an OVS
+ DaemonSet itself or expect someone else to start OVS. As of 4.6, OVS is always
+ run as a system service, and this flag is ignored.
+ type: boolean
+ vxlanPort:
+ description: vxlanPort is the port to use for all vxlan packets.
+ The default is 4789.
+ format: int32
+ minimum: 0
+ type: integer
+ type: object
+ ovnKubernetesConfig:
+ description: ovnKubernetesConfig configures the ovn-kubernetes
+ plugin.
+ properties:
+ bgpManagedConfig:
+ description: |-
+ bgpManagedConfig configures the BGP properties for networks (default network or CUDNs)
+ in no-overlay mode that specify routing="Managed" in their NoOverlayOptions.
+ It is required when DefaultNetworkNoOverlayOptions.Routing is set to "Managed".
+ When omitted, this means the user does not configure BGP for managed routing.
+ properties:
+ asNumber:
+ description: |-
+ asNumber is the 2-byte or 4-byte Autonomous System Number (ASN)
+ to be used in the generated FRR configuration. It is required
+ when NoOverlayOptions.Routing is "Managed".
+ Valid values are 1 to 4294967295.
+ format: int32
+ maximum: 4294967295
+ minimum: 1
+ type: integer
+ bgpTopology:
+ default: fullMesh
+ description: |-
+ bgpTopology defines the BGP topology to be used.
+ Allowed values are "fullMesh".
+ When set to "fullMesh", every node deploys a BGP router, forming a BGP full mesh.
+ When omitted, this means the user has no opinion and the platform chooses a reasonable default which is subject to change over time.
+ The current default is "fullMesh".
+ enum:
+ - fullMesh
+ type: string
+ required:
+ - asNumber
+ type: object
+ defaultNetworkNoOverlayOptions:
+ description: |-
+ defaultNetworkNoOverlayOptions contains configuration for no-overlay mode for the default network.
+ It is required when DefaultNetworkTransport is "NoOverlay".
+ When omitted, this means the user does not configure no-overlay mode options.
+ properties:
+ outboundSNAT:
+ description: |-
+ outboundSNAT defines the SNAT behavior for outbound traffic from pods.
+ Allowed values are "Enable" and "Disable".
+ When set to "Enable", SNAT is performed on outbound traffic from pods.
+ When set to "Disable", SNAT is not performed and pod IPs are preserved in outbound traffic.
+ This field is required when the network operates in no-overlay mode.
+ enum:
+ - Enable
+ - Disable
+ type: string
+ routing:
+ description: |-
+ routing specifies whether the pod network routing is managed by OVN-Kubernetes or users.
+ Allowed values are "Managed" and "Unmanaged".
+ When set to "Managed", OVN-Kubernetes manages the pod network routing configuration through BGP.
+ When set to "Unmanaged", users are responsible for configuring the pod network routing.
+ This field is required when the network operates in no-overlay mode.
+ enum:
+ - Managed
+ - Unmanaged
+ type: string
+ required:
+ - outboundSNAT
+ - routing
+ type: object
+ defaultNetworkTransport:
+ default: Geneve
+ description: |-
+ defaultNetworkTransport describes the transport protocol for east-west traffic for the default network.
+ Allowed values are "NoOverlay" and "Geneve".
+ When set to "NoOverlay", the default network operates in no-overlay mode.
+ When set to "Geneve", the default network uses Geneve overlay.
+ When omitted, this means the user has no opinion and the platform chooses a reasonable default which is subject to change over time.
+ The current default is "Geneve".
+ enum:
+ - NoOverlay
+ - Geneve
+ type: string
+ egressIPConfig:
+ description: egressIPConfig holds the configuration for EgressIP
+ options.
+ properties:
+ reachabilityTotalTimeoutSeconds:
+ description: |-
+ reachabilityTotalTimeout configures the EgressIP node reachability check total timeout in seconds.
+ If the EgressIP node cannot be reached within this timeout, the node is declared down.
+ Setting a large value may cause the EgressIP feature to react slowly to node changes.
+ In particular, it may react slowly for EgressIP nodes that really have a genuine problem and are unreachable.
+ When omitted, this means the user has no opinion and the platform is left to choose a reasonable default, which is subject to change over time.
+ The current default is 1 second.
+ A value of 0 disables the EgressIP node's reachability check.
+ format: int32
+ maximum: 60
+ minimum: 0
+ type: integer
+ type: object
+ gatewayConfig:
+ description: gatewayConfig holds the configuration for node
+ gateway options.
+ properties:
+ ipForwarding:
+ description: |-
+ ipForwarding controls IP forwarding for all traffic on OVN-Kubernetes managed interfaces (such as br-ex).
+ By default this is set to Restricted, and Kubernetes related traffic is still forwarded appropriately, but other
+ IP traffic will not be routed by the OCP node. If there is a desire to allow the host to forward traffic across
+ OVN-Kubernetes managed interfaces, then set this field to "Global".
+ The supported values are "Restricted" and "Global".
+ type: string
+ ipv4:
+ description: |-
+ ipv4 allows users to configure IP settings for IPv4 connections. When omitted, this means no opinion and the default
+ configuration is used. Check individual members fields within ipv4 for details of default values.
+ properties:
+ internalMasqueradeSubnet:
+ description: |-
+ internalMasqueradeSubnet contains the masquerade addresses in IPV4 CIDR format used internally by
+ ovn-kubernetes to enable host to service traffic. Each host in the cluster is configured with these
+ addresses, as well as the shared gateway bridge interface. The values can be changed after
+ installation. The subnet chosen should not overlap with other networks specified for
+ OVN-Kubernetes as well as other networks used on the host. Additionally the subnet must
+ be large enough to accommodate 6 IPs (maximum prefix length /29).
+ When omitted, this means no opinion and the platform is left to choose a reasonable default which is subject to change over time.
+ The current default subnet is 169.254.0.0/17
+ The value must be in proper IPV4 CIDR format
+ maxLength: 18
+ type: string
+ x-kubernetes-validations:
+ - message: Subnet must be in valid IPV4 CIDR format
+ rule: isCIDR(self) && cidr(self).ip().family() ==
+ 4
+ - message: subnet must be in the range /0 to /29 inclusive
+ rule: isCIDR(self) && cidr(self).prefixLength()
+ <= 29
+ - message: first IP address octet must not be 0
+ rule: isCIDR(self) && int(self.split('.')[0]) >
+ 0
+ type: object
+ ipv6:
+ description: |-
+ ipv6 allows users to configure IP settings for IPv6 connections. When omitted, this means no opinion and the default
+ configuration is used. Check individual members fields within ipv6 for details of default values.
+ properties:
+ internalMasqueradeSubnet:
+ description: |-
+ internalMasqueradeSubnet contains the masquerade addresses in IPV6 CIDR format used internally by
+ ovn-kubernetes to enable host to service traffic. Each host in the cluster is configured with these
+ addresses, as well as the shared gateway bridge interface. The values can be changed after
+ installation. The subnet chosen should not overlap with other networks specified for
+ OVN-Kubernetes as well as other networks used on the host. Additionally the subnet must
+ be large enough to accommodate 6 IPs (maximum prefix length /125).
+ When omitted, this means no opinion and the platform is left to choose a reasonable default which is subject to change over time.
+ The current default subnet is fd69::/112
+ Note that IPV6 dual addresses are not permitted
+ type: string
+ x-kubernetes-validations:
+ - message: Subnet must be in valid IPV6 CIDR format
+ rule: isCIDR(self) && cidr(self).ip().family() ==
+ 6
+ - message: subnet must be in the range /0 to /125
+ inclusive
+ rule: isCIDR(self) && cidr(self).prefixLength()
+ <= 125
+ type: object
+ routingViaHost:
+ default: false
+ description: |-
+ routingViaHost allows pod egress traffic to exit via the ovn-k8s-mp0 management port
+ into the host before sending it out. If this is not set, traffic will always egress directly
+ from OVN to outside without touching the host stack. Setting this to true means hardware
+ offload will not be supported. Default is false if GatewayConfig is specified.
+ type: boolean
+ type: object
+ genevePort:
+ description: |-
+ geneve port is the UDP port to be used by geneve encapulation.
+ Default is 6081
+ format: int32
+ minimum: 1
+ type: integer
+ hybridOverlayConfig:
+ description: |-
+ hybridOverlayConfig configures an additional overlay network for peers that are
+ not using OVN.
+ properties:
+ hybridClusterNetwork:
+ description: hybridClusterNetwork defines a network space
+ given to nodes on an additional overlay network.
+ items:
+ description: |-
+ ClusterNetworkEntry is a subnet from which to allocate PodIPs. A network of size
+ HostPrefix (in CIDR notation) will be allocated when nodes join the cluster. If
+ the HostPrefix field is not used by the plugin, it can be left unset.
+ Not all network providers support multiple ClusterNetworks
+ properties:
+ cidr:
+ type: string
+ hostPrefix:
+ format: int32
+ minimum: 0
+ type: integer
+ type: object
+ type: array
+ x-kubernetes-list-type: atomic
+ hybridOverlayVXLANPort:
+ description: |-
+ hybridOverlayVXLANPort defines the VXLAN port number to be used by the additional overlay network.
+ Default is 4789
+ format: int32
+ type: integer
+ type: object
+ ipsecConfig:
+ default:
+ mode: Disabled
+ description: |-
+ ipsecConfig enables and configures IPsec for pods on the pod network within the
+ cluster.
+ properties:
+ full:
+ description: |-
+ full defines configuration parameters for the IPsec `Full` mode.
+ This is permitted only when mode is configured with `Full`,
+ and forbidden otherwise.
+ minProperties: 1
+ properties:
+ encapsulation:
+ description: |-
+ encapsulation option to configure libreswan on how inter-pod traffic across nodes
+ are encapsulated to handle NAT traversal. When configured it uses UDP port 4500
+ for the encapsulation.
+ Valid values are Always, Auto and omitted.
+ Always means enable UDP encapsulation regardless of whether NAT is detected.
+ Auto means enable UDP encapsulation based on the detection of NAT.
+ When omitted, this means no opinion and the platform is left to choose a reasonable
+ default, which is subject to change over time. The current default is Auto.
+ enum:
+ - Always
+ - Auto
+ type: string
+ type: object
+ mode:
+ description: |-
+ mode defines the behaviour of the ipsec configuration within the platform.
+ Valid values are `Disabled`, `External` and `Full`.
+ When 'Disabled', ipsec will not be enabled at the node level.
+ When 'External', ipsec is enabled on the node level but requires the user to configure the secure communication parameters.
+ This mode is for external secure communications and the configuration can be done using the k8s-nmstate operator.
+ When 'Full', ipsec is configured on the node level and inter-pod secure communication within the cluster is configured.
+ Note with `Full`, if ipsec is desired for communication with external (to the cluster) entities (such as storage arrays),
+ this is left to the user to configure.
+ enum:
+ - Disabled
+ - External
+ - Full
+ type: string
+ type: object
+ x-kubernetes-validations:
+ - message: ipsecConfig.mode is required
+ rule: self == oldSelf || has(self.mode)
+ - message: full is forbidden when mode is not Full
+ rule: 'has(self.mode) && self.mode == ''Full'' ? true :
+ !has(self.full)'
+ ipv4:
+ description: |-
+ ipv4 allows users to configure IP settings for IPv4 connections. When ommitted,
+ this means no opinions and the default configuration is used. Check individual
+ fields within ipv4 for details of default values.
+ properties:
+ internalJoinSubnet:
+ description: |-
+ internalJoinSubnet is a v4 subnet used internally by ovn-kubernetes in case the
+ default one is being already used by something else. It must not overlap with
+ any other subnet being used by OpenShift or by the node network. The size of the
+ subnet must be larger than the number of nodes.
+ The current default value is 100.64.0.0/16
+ The subnet must be large enough to accommodate one IP per node in your cluster
+ The value must be in proper IPV4 CIDR format
+ maxLength: 18
+ type: string
+ x-kubernetes-validations:
+ - message: Subnet must be in valid IPV4 CIDR format
+ rule: isCIDR(self) && cidr(self).ip().family() == 4
+ - message: subnet must be in the range /0 to /30 inclusive
+ rule: isCIDR(self) && cidr(self).prefixLength() <= 30
+ - message: first IP address octet must not be 0
+ rule: isCIDR(self) && int(self.split('.')[0]) > 0
+ internalTransitSwitchSubnet:
+ description: |-
+ internalTransitSwitchSubnet is a v4 subnet in IPV4 CIDR format used internally
+ by OVN-Kubernetes for the distributed transit switch in the OVN Interconnect
+ architecture that connects the cluster routers on each node together to enable
+ east west traffic. The subnet chosen should not overlap with other networks
+ specified for OVN-Kubernetes as well as other networks used on the host.
+ When ommitted, this means no opinion and the platform is left to choose a reasonable
+ default which is subject to change over time.
+ The current default subnet is 100.88.0.0/16
+ The subnet must be large enough to accommodate one IP per node in your cluster
+ The value must be in proper IPV4 CIDR format
+ maxLength: 18
+ type: string
+ x-kubernetes-validations:
+ - message: Subnet must be in valid IPV4 CIDR format
+ rule: isCIDR(self) && cidr(self).ip().family() == 4
+ - message: subnet must be in the range /0 to /30 inclusive
+ rule: isCIDR(self) && cidr(self).prefixLength() <= 30
+ - message: first IP address octet must not be 0
+ rule: isCIDR(self) && int(self.split('.')[0]) > 0
+ type: object
+ ipv6:
+ description: |-
+ ipv6 allows users to configure IP settings for IPv6 connections. When ommitted,
+ this means no opinions and the default configuration is used. Check individual
+ fields within ipv4 for details of default values.
+ properties:
+ internalJoinSubnet:
+ description: |-
+ internalJoinSubnet is a v6 subnet used internally by ovn-kubernetes in case the
+ default one is being already used by something else. It must not overlap with
+ any other subnet being used by OpenShift or by the node network. The size of the
+ subnet must be larger than the number of nodes.
+ The subnet must be large enough to accommodate one IP per node in your cluster
+ The current default value is fd98::/64
+ The value must be in proper IPV6 CIDR format
+ Note that IPV6 dual addresses are not permitted
+ maxLength: 48
+ type: string
+ x-kubernetes-validations:
+ - message: Subnet must be in valid IPV6 CIDR format
+ rule: isCIDR(self) && cidr(self).ip().family() == 6
+ - message: subnet must be in the range /0 to /125 inclusive
+ rule: isCIDR(self) && cidr(self).prefixLength() <= 125
+ internalTransitSwitchSubnet:
+ description: |-
+ internalTransitSwitchSubnet is a v4 subnet in IPV4 CIDR format used internally
+ by OVN-Kubernetes for the distributed transit switch in the OVN Interconnect
+ architecture that connects the cluster routers on each node together to enable
+ east west traffic. The subnet chosen should not overlap with other networks
+ specified for OVN-Kubernetes as well as other networks used on the host.
+ When ommitted, this means no opinion and the platform is left to choose a reasonable
+ default which is subject to change over time.
+ The subnet must be large enough to accommodate one IP per node in your cluster
+ The current default subnet is fd97::/64
+ The value must be in proper IPV6 CIDR format
+ Note that IPV6 dual addresses are not permitted
+ maxLength: 48
+ type: string
+ x-kubernetes-validations:
+ - message: Subnet must be in valid IPV6 CIDR format
+ rule: isCIDR(self) && cidr(self).ip().family() == 6
+ - message: subnet must be in the range /0 to /125 inclusive
+ rule: isCIDR(self) && cidr(self).prefixLength() <= 125
+ type: object
+ mtu:
+ description: |-
+ mtu is the MTU to use for the tunnel interface. This must be 100
+ bytes smaller than the uplink mtu.
+ Default is 1400
+ format: int32
+ minimum: 0
+ type: integer
+ policyAuditConfig:
+ description: |-
+ policyAuditConfig is the configuration for network policy audit events. If unset,
+ reported defaults are used.
+ properties:
+ destination:
+ default: "null"
+ description: |-
+ destination is the location for policy log messages.
+ Regardless of this config, persistent logs will always be dumped to the host
+ at /var/log/ovn/ however
+ Additionally syslog output may be configured as follows.
+ Valid values are:
+ - "libc" -> to use the libc syslog() function of the host node's journdald process
+ - "udp:host:port" -> for sending syslog over UDP
+ - "unix:file" -> for using the UNIX domain socket directly
+ - "null" -> to discard all messages logged to syslog
+ The default is "null"
+ type: string
+ maxFileSize:
+ default: 50
+ description: |-
+ maxFilesSize is the max size an ACL_audit log file is allowed to reach before rotation occurs
+ Units are in MB and the Default is 50MB
+ format: int32
+ minimum: 1
+ type: integer
+ maxLogFiles:
+ default: 5
+ description: maxLogFiles specifies the maximum number
+ of ACL_audit log files that can be present.
+ format: int32
+ minimum: 1
+ type: integer
+ rateLimit:
+ default: 20
+ description: |-
+ rateLimit is the approximate maximum number of messages to generate per-second per-node. If
+ unset the default of 20 msg/sec is used.
+ format: int32
+ minimum: 1
+ type: integer
+ syslogFacility:
+ default: local0
+ description: syslogFacility the RFC5424 facility for generated
+ messages, e.g. "kern". Default is "local0"
+ type: string
+ type: object
+ routeAdvertisements:
+ description: |-
+ routeAdvertisements determines if the functionality to advertise cluster
+ network routes through a dynamic routing protocol, such as BGP, is
+ enabled or not. This functionality is configured through the
+ ovn-kubernetes RouteAdvertisements CRD. Requires the 'FRR' routing
+ capability provider to be enabled as an additional routing capability.
+ Allowed values are "Enabled", "Disabled" and ommited. When omitted, this
+ means the user has no opinion and the platform is left to choose
+ reasonable defaults. These defaults are subject to change over time. The
+ current default is "Disabled".
+ enum:
+ - ""
+ - Enabled
+ - Disabled
+ type: string
+ v4InternalSubnet:
+ description: |-
+ v4InternalSubnet is a v4 subnet used internally by ovn-kubernetes in case the
+ default one is being already used by something else. It must not overlap with
+ any other subnet being used by OpenShift or by the node network. The size of the
+ subnet must be larger than the number of nodes.
+ Default is 100.64.0.0/16
+ type: string
+ v6InternalSubnet:
+ description: |-
+ v6InternalSubnet is a v6 subnet used internally by ovn-kubernetes in case the
+ default one is being already used by something else. It must not overlap with
+ any other subnet being used by OpenShift or by the node network. The size of the
+ subnet must be larger than the number of nodes.
+ Default is fd98::/64
+ type: string
+ type: object
+ x-kubernetes-validations:
+ - message: defaultNetworkNoOverlayOptions is only supported for
+ no-overlay networks
+ rule: '''self.defaultNetworkTransport == "NoOverlay" || !has(self.defaultNetworkNoOverlayOptions)'''
+ - message: bgpManagedConfig is required when DefaultNetworkTransport
+ is NoOverlay, DefaultNetworkNoOverlayOptions is set and DefaultNetworkNoOverlayOptions.Routing="Managed"
+ rule: '''!(self.defaultNetworkTransport == "NoOverlay" && has(self.defaultNetworkNoOverlayOptions)
+ && self.defaultNetworkNoOverlayOptions.routing == "Managed")
+ || has(self.bgpManagedConfig)'''
+ - message: DefaultNetworkTransport field is immutable
+ rule: '''self.defaultNetworkTransport == oldSelf.defaultNetworkTransport'''
+ - message: defaultNetworkNoOverlayOptions field is immutable
+ rule: '''self.defaultNetworkNoOverlayOptions == oldSelf.defaultNetworkNoOverlayOptions'''
+ - message: bgpManagedConfig field is immutable
+ rule: '''self.bgpManagedConfig == oldSelf.bgpManagedConfig'''
+ type:
+ description: |-
+ type is the type of network
+ All NetworkTypes are supported except for NetworkTypeRaw
+ type: string
+ type: object
+ deployKubeProxy:
+ description: |-
+ deployKubeProxy specifies whether or not a standalone kube-proxy should
+ be deployed by the operator. Some network providers include kube-proxy
+ or similar functionality. If unset, the plugin will attempt to select
+ the correct value, which is false when ovn-kubernetes is used and true
+ otherwise.
+ type: boolean
+ disableMultiNetwork:
+ description: |-
+ disableMultiNetwork defaults to 'false' and this setting enables the pod multi-networking capability.
+ disableMultiNetwork when set to 'true' at cluster install time does not install the components, typically the Multus CNI and the network-attachment-definition CRD,
+ that enable the pod multi-networking capability. Setting the parameter to 'true' might be useful when you need install third-party CNI plugins,
+ but these plugins are not supported by Red Hat. Changing the parameter value as a postinstallation cluster task has no effect.
+ type: boolean
+ disableNetworkDiagnostics:
+ default: false
+ description: |-
+ disableNetworkDiagnostics specifies whether or not PodNetworkConnectivityCheck
+ CRs from a test pod to every node, apiserver and LB should be disabled or not.
+ If unset, this property defaults to 'false' and network diagnostics is enabled.
+ Setting this to 'true' would reduce the additional load of the pods performing the checks.
+ type: boolean
+ exportNetworkFlows:
+ description: |-
+ exportNetworkFlows enables and configures the export of network flow metadata from the pod network
+ by using protocols NetFlow, SFlow or IPFIX. Currently only supported on OVN-Kubernetes plugin.
+ If unset, flows will not be exported to any collector.
+ properties:
+ ipfix:
+ description: ipfix defines IPFIX configuration.
+ properties:
+ collectors:
+ description: ipfixCollectors is list of strings formatted
+ as ip:port with a maximum of ten items
+ items:
+ pattern: ^(([0-9]|[0-9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5])\.){3}([0-9]|[0-9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5]):([1-9][0-9]{0,3}|[1-5][0-9]{4}|6[0-4][0-9]{3}|65[0-4][0-9]{2}|655[0-2][0-9]|6553[0-5])$
+ type: string
+ maxItems: 10
+ minItems: 1
+ type: array
+ x-kubernetes-list-type: atomic
+ type: object
+ netFlow:
+ description: netFlow defines the NetFlow configuration.
+ properties:
+ collectors:
+ description: |-
+ netFlow defines the NetFlow collectors that will consume the flow data exported from OVS.
+ It is a list of strings formatted as ip:port with a maximum of ten items
+ items:
+ pattern: ^(([0-9]|[0-9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5])\.){3}([0-9]|[0-9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5]):([1-9][0-9]{0,3}|[1-5][0-9]{4}|6[0-4][0-9]{3}|65[0-4][0-9]{2}|655[0-2][0-9]|6553[0-5])$
+ type: string
+ maxItems: 10
+ minItems: 1
+ type: array
+ x-kubernetes-list-type: atomic
+ type: object
+ sFlow:
+ description: sFlow defines the SFlow configuration.
+ properties:
+ collectors:
+ description: sFlowCollectors is list of strings formatted
+ as ip:port with a maximum of ten items
+ items:
+ pattern: ^(([0-9]|[0-9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5])\.){3}([0-9]|[0-9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5]):([1-9][0-9]{0,3}|[1-5][0-9]{4}|6[0-4][0-9]{3}|65[0-4][0-9]{2}|655[0-2][0-9]|6553[0-5])$
+ type: string
+ maxItems: 10
+ minItems: 1
+ type: array
+ x-kubernetes-list-type: atomic
+ type: object
+ type: object
+ kubeProxyConfig:
+ description: |-
+ kubeProxyConfig lets us configure desired proxy configuration, if
+ deployKubeProxy is true. If not specified, sensible defaults will be chosen by
+ OpenShift directly.
+ properties:
+ bindAddress:
+ description: |-
+ The address to "bind" on
+ Defaults to 0.0.0.0
+ type: string
+ iptablesSyncPeriod:
+ description: |-
+ An internal kube-proxy parameter. In older releases of OCP, this sometimes needed to be adjusted
+ in large clusters for performance reasons, but this is no longer necessary, and there is no reason
+ to change this from the default value.
+ Default: 30s
+ type: string
+ proxyArguments:
+ additionalProperties:
+ description: ProxyArgumentList is a list of arguments to pass
+ to the kubeproxy process
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: atomic
+ description: Any additional arguments to pass to the kubeproxy
+ process
+ type: object
+ type: object
+ logLevel:
+ default: Normal
+ description: |-
+ logLevel is an intent based logging for an overall component. It does not give fine grained control, but it is a
+ simple way to manage coarse grained logging choices that operators have to interpret for their operands.
+
+ Valid values are: "Normal", "Debug", "Trace", "TraceAll".
+ Defaults to "Normal".
+ enum:
+ - ""
+ - Normal
+ - Debug
+ - Trace
+ - TraceAll
+ type: string
+ managementState:
+ description: managementState indicates whether and how the operator
+ should manage the component
+ pattern: ^(Managed|Unmanaged|Force|Removed)$
+ type: string
+ migration:
+ description: |-
+ migration enables and configures cluster network migration, for network changes
+ that cannot be made instantly.
+ properties:
+ features:
+ description: |-
+ features was previously used to configure which network plugin features
+ would be migrated in a network type migration.
+ DEPRECATED: network type migration is no longer supported, and setting
+ this to a non-empty value will result in the network operator rejecting
+ the configuration.
+ properties:
+ egressFirewall:
+ default: true
+ description: |-
+ egressFirewall specified whether or not the Egress Firewall configuration was migrated.
+ DEPRECATED: network type migration is no longer supported.
+ type: boolean
+ egressIP:
+ default: true
+ description: |-
+ egressIP specified whether or not the Egress IP configuration was migrated.
+ DEPRECATED: network type migration is no longer supported.
+ type: boolean
+ multicast:
+ default: true
+ description: |-
+ multicast specified whether or not the multicast configuration was migrated.
+ DEPRECATED: network type migration is no longer supported.
+ type: boolean
+ type: object
+ mode:
+ description: |-
+ mode indicates the mode of network type migration.
+ DEPRECATED: network type migration is no longer supported, and setting
+ this to a non-empty value will result in the network operator rejecting
+ the configuration.
+ enum:
+ - Live
+ - Offline
+ - ""
+ type: string
+ mtu:
+ description: |-
+ mtu contains the MTU migration configuration. Set this to allow changing
+ the MTU values for the default network. If unset, the operation of
+ changing the MTU for the default network will be rejected.
+ properties:
+ machine:
+ description: |-
+ machine contains MTU migration configuration for the machine's uplink.
+ Needs to be migrated along with the default network MTU unless the
+ current uplink MTU already accommodates the default network MTU.
+ properties:
+ from:
+ description: from is the MTU to migrate from.
+ format: int32
+ minimum: 0
+ type: integer
+ to:
+ description: to is the MTU to migrate to.
+ format: int32
+ minimum: 0
+ type: integer
+ type: object
+ network:
+ description: |-
+ network contains information about MTU migration for the default network.
+ Migrations are only allowed to MTU values lower than the machine's uplink
+ MTU by the minimum appropriate offset.
+ properties:
+ from:
+ description: from is the MTU to migrate from.
+ format: int32
+ minimum: 0
+ type: integer
+ to:
+ description: to is the MTU to migrate to.
+ format: int32
+ minimum: 0
+ type: integer
+ type: object
+ type: object
+ networkType:
+ description: |-
+ networkType was previously used when changing the default network type.
+ DEPRECATED: network type migration is no longer supported, and setting
+ this to a non-empty value will result in the network operator rejecting
+ the configuration.
+ type: string
+ type: object
+ x-kubernetes-validations:
+ - message: networkType migration in mode other than 'Live' may not
+ be configured at the same time as mtu migration
+ rule: '!has(self.mtu) || !has(self.networkType) || self.networkType
+ == "" || has(self.mode) && self.mode == ''Live'''
+ observedConfig:
+ description: |-
+ observedConfig holds a sparse config that controller has observed from the cluster state. It exists in spec because
+ it is an input to the level for the operator
+ nullable: true
+ type: object
+ x-kubernetes-preserve-unknown-fields: true
+ operatorLogLevel:
+ default: Normal
+ description: |-
+ operatorLogLevel is an intent based logging for the operator itself. It does not give fine grained control, but it is a
+ simple way to manage coarse grained logging choices that operators have to interpret for themselves.
+
+ Valid values are: "Normal", "Debug", "Trace", "TraceAll".
+ Defaults to "Normal".
+ enum:
+ - ""
+ - Normal
+ - Debug
+ - Trace
+ - TraceAll
+ type: string
+ serviceNetwork:
+ description: |-
+ serviceNetwork is the ip address pool to use for Service IPs
+ Currently, all existing network providers only support a single value
+ here, but this is an array to allow for growth.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: atomic
+ unsupportedConfigOverrides:
+ description: |-
+ unsupportedConfigOverrides overrides the final configuration that was computed by the operator.
+ Red Hat does not support the use of this field.
+ Misuse of this field could lead to unexpected behavior or conflict with other configuration options.
+ Seek guidance from the Red Hat support before using this field.
+ Use of this property blocks cluster upgrades, it must be removed before upgrading your cluster.
+ nullable: true
+ type: object
+ x-kubernetes-preserve-unknown-fields: true
+ useMultiNetworkPolicy:
+ description: |-
+ useMultiNetworkPolicy enables a controller which allows for
+ MultiNetworkPolicy objects to be used on additional networks as
+ created by Multus CNI. MultiNetworkPolicy are similar to NetworkPolicy
+ objects, but NetworkPolicy objects only apply to the primary interface.
+ With MultiNetworkPolicy, you can control the traffic that a pod can receive
+ over the secondary interfaces. If unset, this property defaults to 'false'
+ and MultiNetworkPolicy objects are ignored. If 'disableMultiNetwork' is
+ 'true' then the value of this field is ignored.
+ type: boolean
+ type: object
+ x-kubernetes-validations:
+ - message: Route advertisements cannot be Enabled if 'FRR' routing capability
+ provider is not available
+ rule: (has(self.additionalRoutingCapabilities) && ('FRR' in self.additionalRoutingCapabilities.providers))
+ || !has(self.defaultNetwork) || !has(self.defaultNetwork.ovnKubernetesConfig)
+ || !has(self.defaultNetwork.ovnKubernetesConfig.routeAdvertisements)
+ || self.defaultNetwork.ovnKubernetesConfig.routeAdvertisements !=
+ 'Enabled'
+ - message: invalid value for IPForwarding, valid values are 'Restricted'
+ or 'Global'
+ rule: '!has(self.defaultNetwork) || !has(self.defaultNetwork.ovnKubernetesConfig)
+ || !has(self.defaultNetwork.ovnKubernetesConfig.gatewayConfig) ||
+ !has(self.defaultNetwork.ovnKubernetesConfig.gatewayConfig.ipForwarding)
+ || self.defaultNetwork.ovnKubernetesConfig.gatewayConfig.ipForwarding
+ == oldSelf.defaultNetwork.ovnKubernetesConfig.gatewayConfig.ipForwarding
+ || self.defaultNetwork.ovnKubernetesConfig.gatewayConfig.ipForwarding
+ == ''Restricted'' || self.defaultNetwork.ovnKubernetesConfig.gatewayConfig.ipForwarding
+ == ''Global'''
+ status:
+ description: |-
+ NetworkStatus is detailed operator status, which is distilled
+ up to the Network clusteroperator object.
+ properties:
+ conditions:
+ description: conditions is a list of conditions and their status
+ items:
+ description: OperatorCondition is just the standard condition fields.
+ properties:
+ lastTransitionTime:
+ description: |-
+ lastTransitionTime is the last time the condition transitioned from one status to another.
+ This should be when the underlying condition changed. If that is not known, then using the time when the API field changed is acceptable.
+ format: date-time
+ type: string
+ message:
+ type: string
+ reason:
+ type: string
+ status:
+ description: status of the condition, one of True, False, Unknown.
+ enum:
+ - "True"
+ - "False"
+ - Unknown
+ type: string
+ type:
+ description: type of condition in CamelCase or in foo.example.com/CamelCase.
+ maxLength: 316
+ pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$
+ type: string
+ required:
+ - lastTransitionTime
+ - status
+ - type
+ type: object
+ type: array
+ x-kubernetes-list-map-keys:
+ - type
+ x-kubernetes-list-type: map
+ generations:
+ description: generations are used to determine when an item needs
+ to be reconciled or has changed in a way that needs a reaction.
+ items:
+ description: GenerationStatus keeps track of the generation for
+ a given resource so that decisions about forced updates can be
+ made.
+ properties:
+ group:
+ description: group is the group of the thing you're tracking
+ type: string
+ hash:
+ description: hash is an optional field set for resources without
+ generation that are content sensitive like secrets and configmaps
+ type: string
+ lastGeneration:
+ description: lastGeneration is the last generation of the workload
+ controller involved
+ format: int64
+ type: integer
+ name:
+ description: name is the name of the thing you're tracking
+ type: string
+ namespace:
+ description: namespace is where the thing you're tracking is
+ type: string
+ resource:
+ description: resource is the resource type of the thing you're
+ tracking
+ type: string
+ required:
+ - group
+ - name
+ - namespace
+ - resource
+ type: object
+ type: array
+ x-kubernetes-list-map-keys:
+ - group
+ - resource
+ - namespace
+ - name
+ x-kubernetes-list-type: map
+ latestAvailableRevision:
+ description: latestAvailableRevision is the deploymentID of the most
+ recent deployment
+ format: int32
+ type: integer
+ x-kubernetes-validations:
+ - message: must only increase
+ rule: self >= oldSelf
+ observedGeneration:
+ description: observedGeneration is the last generation change you've
+ dealt with
+ format: int64
+ type: integer
+ readyReplicas:
+ description: readyReplicas indicates how many replicas are ready and
+ at the desired state
+ format: int32
+ type: integer
+ version:
+ description: version is the level this availability applies to
+ type: string
+ type: object
+ type: object
+ served: true
+ storage: true
+ subresources:
+ status: {}
diff --git a/operator/v1/zz_generated.crd-manifests/0000_70_network_01_networks.crd.yaml b/operator/v1/zz_generated.crd-manifests/0000_70_network_01_networks-Default.crd.yaml
similarity index 97%
rename from operator/v1/zz_generated.crd-manifests/0000_70_network_01_networks.crd.yaml
rename to operator/v1/zz_generated.crd-manifests/0000_70_network_01_networks-Default.crd.yaml
index 7a41655bd17..6561c730d3f 100644
--- a/operator/v1/zz_generated.crd-manifests/0000_70_network_01_networks.crd.yaml
+++ b/operator/v1/zz_generated.crd-manifests/0000_70_network_01_networks-Default.crd.yaml
@@ -6,6 +6,7 @@ metadata:
api.openshift.io/merged-by-featuregates: "true"
include.release.openshift.io/ibm-cloud-managed: "true"
include.release.openshift.io/self-managed-high-availability: "true"
+ release.openshift.io/feature-set: Default
name: networks.operator.openshift.io
spec:
group: operator.openshift.io
@@ -634,6 +635,21 @@ spec:
Default is fd98::/64
type: string
type: object
+ x-kubernetes-validations:
+ - message: defaultNetworkNoOverlayOptions is only supported for
+ no-overlay networks
+ rule: '''self.defaultNetworkTransport == "NoOverlay" || !has(self.defaultNetworkNoOverlayOptions)'''
+ - message: bgpManagedConfig is required when DefaultNetworkTransport
+ is NoOverlay, DefaultNetworkNoOverlayOptions is set and DefaultNetworkNoOverlayOptions.Routing="Managed"
+ rule: '''!(self.defaultNetworkTransport == "NoOverlay" && has(self.defaultNetworkNoOverlayOptions)
+ && self.defaultNetworkNoOverlayOptions.routing == "Managed")
+ || has(self.bgpManagedConfig)'''
+ - message: DefaultNetworkTransport field is immutable
+ rule: '''self.defaultNetworkTransport == oldSelf.defaultNetworkTransport'''
+ - message: defaultNetworkNoOverlayOptions field is immutable
+ rule: '''self.defaultNetworkNoOverlayOptions == oldSelf.defaultNetworkNoOverlayOptions'''
+ - message: bgpManagedConfig field is immutable
+ rule: '''self.bgpManagedConfig == oldSelf.bgpManagedConfig'''
type:
description: |-
type is the type of network
diff --git a/operator/v1/zz_generated.crd-manifests/0000_70_network_01_networks-DevPreviewNoUpgrade.crd.yaml b/operator/v1/zz_generated.crd-manifests/0000_70_network_01_networks-DevPreviewNoUpgrade.crd.yaml
new file mode 100644
index 00000000000..b34f5445370
--- /dev/null
+++ b/operator/v1/zz_generated.crd-manifests/0000_70_network_01_networks-DevPreviewNoUpgrade.crd.yaml
@@ -0,0 +1,1060 @@
+apiVersion: apiextensions.k8s.io/v1
+kind: CustomResourceDefinition
+metadata:
+ annotations:
+ api-approved.openshift.io: https://github.com/openshift/api/pull/475
+ api.openshift.io/merged-by-featuregates: "true"
+ include.release.openshift.io/ibm-cloud-managed: "true"
+ include.release.openshift.io/self-managed-high-availability: "true"
+ release.openshift.io/feature-set: DevPreviewNoUpgrade
+ name: networks.operator.openshift.io
+spec:
+ group: operator.openshift.io
+ names:
+ kind: Network
+ listKind: NetworkList
+ plural: networks
+ singular: network
+ scope: Cluster
+ versions:
+ - name: v1
+ schema:
+ openAPIV3Schema:
+ description: |-
+ Network describes the cluster's desired network configuration. It is
+ consumed by the cluster-network-operator.
+
+ Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
+ properties:
+ apiVersion:
+ description: |-
+ APIVersion defines the versioned schema of this representation of an object.
+ Servers should convert recognized schemas to the latest internal value, and
+ may reject unrecognized values.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
+ type: string
+ kind:
+ description: |-
+ Kind is a string value representing the REST resource this object represents.
+ Servers may infer this from the endpoint the client submits requests to.
+ Cannot be updated.
+ In CamelCase.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
+ type: string
+ metadata:
+ type: object
+ spec:
+ description: NetworkSpec is the top-level network configuration object.
+ properties:
+ additionalNetworks:
+ description: |-
+ additionalNetworks is a list of extra networks to make available to pods
+ when multiple networks are enabled.
+ items:
+ description: |-
+ AdditionalNetworkDefinition configures an extra network that is available but not
+ created by default. Instead, pods must request them by name.
+ type must be specified, along with exactly one "Config" that matches the type.
+ properties:
+ name:
+ description: |-
+ name is the name of the network. This will be populated in the resulting CRD
+ This must be unique.
+ type: string
+ namespace:
+ description: |-
+ namespace is the namespace of the network. This will be populated in the resulting CRD
+ If not given the network will be created in the default namespace.
+ type: string
+ rawCNIConfig:
+ description: |-
+ rawCNIConfig is the raw CNI configuration json to create in the
+ NetworkAttachmentDefinition CRD
+ type: string
+ simpleMacvlanConfig:
+ description: simpleMacvlanConfig configures the macvlan interface
+ in case of type:NetworkTypeSimpleMacvlan
+ properties:
+ ipamConfig:
+ description: ipamConfig configures IPAM module will be used
+ for IP Address Management (IPAM).
+ properties:
+ staticIPAMConfig:
+ description: staticIPAMConfig configures the static
+ IP address in case of type:IPAMTypeStatic
+ properties:
+ addresses:
+ description: addresses configures IP address for
+ the interface
+ items:
+ description: StaticIPAMAddresses provides IP address
+ and Gateway for static IPAM addresses
+ properties:
+ address:
+ description: address is the IP address in
+ CIDR format
+ type: string
+ gateway:
+ description: gateway is IP inside of subnet
+ to designate as the gateway
+ type: string
+ type: object
+ type: array
+ x-kubernetes-list-type: atomic
+ dns:
+ description: dns configures DNS for the interface
+ properties:
+ domain:
+ description: domain configures the domainname
+ the local domain used for short hostname lookups
+ type: string
+ nameservers:
+ description: nameservers points DNS servers
+ for IP lookup
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: atomic
+ search:
+ description: search configures priority ordered
+ search domains for short hostname lookups
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: atomic
+ type: object
+ routes:
+ description: routes configures IP routes for the
+ interface
+ items:
+ description: StaticIPAMRoutes provides Destination/Gateway
+ pairs for static IPAM routes
+ properties:
+ destination:
+ description: destination points the IP route
+ destination
+ type: string
+ gateway:
+ description: |-
+ gateway is the route's next-hop IP address
+ If unset, a default gateway is assumed (as determined by the CNI plugin).
+ type: string
+ type: object
+ type: array
+ x-kubernetes-list-type: atomic
+ type: object
+ type:
+ description: |-
+ type is the type of IPAM module will be used for IP Address Management(IPAM).
+ The supported values are IPAMTypeDHCP, IPAMTypeStatic
+ type: string
+ type: object
+ master:
+ description: |-
+ master is the host interface to create the macvlan interface from.
+ If not specified, it will be default route interface
+ type: string
+ mode:
+ description: 'mode is the macvlan mode: bridge, private,
+ vepa, passthru. The default is bridge'
+ type: string
+ mtu:
+ description: |-
+ mtu is the mtu to use for the macvlan interface. if unset, host's
+ kernel will select the value.
+ format: int32
+ minimum: 0
+ type: integer
+ type: object
+ type:
+ description: |-
+ type is the type of network
+ The supported values are NetworkTypeRaw, NetworkTypeSimpleMacvlan
+ type: string
+ required:
+ - name
+ type: object
+ type: array
+ x-kubernetes-list-map-keys:
+ - name
+ x-kubernetes-list-type: map
+ additionalRoutingCapabilities:
+ description: |-
+ additionalRoutingCapabilities describes components and relevant
+ configuration providing additional routing capabilities. When set, it
+ enables such components and the usage of the routing capabilities they
+ provide for the machine network. Upstream operators, like MetalLB
+ operator, requiring these capabilities may rely on, or automatically set
+ this attribute. Network plugins may leverage advanced routing
+ capabilities acquired through the enablement of these components but may
+ require specific configuration on their side to do so; refer to their
+ respective documentation and configuration options.
+ properties:
+ providers:
+ description: |-
+ providers is a set of enabled components that provide additional routing
+ capabilities. Entries on this list must be unique. The only valid value
+ is currrently "FRR" which provides FRR routing capabilities through the
+ deployment of FRR.
+ items:
+ description: RoutingCapabilitiesProvider is a component providing
+ routing capabilities.
+ enum:
+ - FRR
+ type: string
+ maxItems: 1
+ minItems: 1
+ type: array
+ x-kubernetes-list-type: atomic
+ x-kubernetes-validations:
+ - rule: self.all(x, self.exists_one(y, x == y))
+ required:
+ - providers
+ type: object
+ clusterNetwork:
+ description: |-
+ clusterNetwork is the IP address pool to use for pod IPs.
+ Some network providers support multiple ClusterNetworks.
+ Others only support one. This is equivalent to the cluster-cidr.
+ items:
+ description: |-
+ ClusterNetworkEntry is a subnet from which to allocate PodIPs. A network of size
+ HostPrefix (in CIDR notation) will be allocated when nodes join the cluster. If
+ the HostPrefix field is not used by the plugin, it can be left unset.
+ Not all network providers support multiple ClusterNetworks
+ properties:
+ cidr:
+ type: string
+ hostPrefix:
+ format: int32
+ minimum: 0
+ type: integer
+ type: object
+ type: array
+ x-kubernetes-list-type: atomic
+ defaultNetwork:
+ description: defaultNetwork is the "default" network that all pods
+ will receive
+ properties:
+ openshiftSDNConfig:
+ description: |-
+ openshiftSDNConfig was previously used to configure the openshift-sdn plugin.
+ DEPRECATED: OpenShift SDN is no longer supported.
+ properties:
+ enableUnidling:
+ description: |-
+ enableUnidling controls whether or not the service proxy will support idling
+ and unidling of services. By default, unidling is enabled.
+ type: boolean
+ mode:
+ description: mode is one of "Multitenant", "Subnet", or "NetworkPolicy"
+ type: string
+ mtu:
+ description: |-
+ mtu is the mtu to use for the tunnel interface. Defaults to 1450 if unset.
+ This must be 50 bytes smaller than the machine's uplink.
+ format: int32
+ minimum: 0
+ type: integer
+ useExternalOpenvswitch:
+ description: |-
+ useExternalOpenvswitch used to control whether the operator would deploy an OVS
+ DaemonSet itself or expect someone else to start OVS. As of 4.6, OVS is always
+ run as a system service, and this flag is ignored.
+ type: boolean
+ vxlanPort:
+ description: vxlanPort is the port to use for all vxlan packets.
+ The default is 4789.
+ format: int32
+ minimum: 0
+ type: integer
+ type: object
+ ovnKubernetesConfig:
+ description: ovnKubernetesConfig configures the ovn-kubernetes
+ plugin.
+ properties:
+ egressIPConfig:
+ description: egressIPConfig holds the configuration for EgressIP
+ options.
+ properties:
+ reachabilityTotalTimeoutSeconds:
+ description: |-
+ reachabilityTotalTimeout configures the EgressIP node reachability check total timeout in seconds.
+ If the EgressIP node cannot be reached within this timeout, the node is declared down.
+ Setting a large value may cause the EgressIP feature to react slowly to node changes.
+ In particular, it may react slowly for EgressIP nodes that really have a genuine problem and are unreachable.
+ When omitted, this means the user has no opinion and the platform is left to choose a reasonable default, which is subject to change over time.
+ The current default is 1 second.
+ A value of 0 disables the EgressIP node's reachability check.
+ format: int32
+ maximum: 60
+ minimum: 0
+ type: integer
+ type: object
+ gatewayConfig:
+ description: gatewayConfig holds the configuration for node
+ gateway options.
+ properties:
+ ipForwarding:
+ description: |-
+ ipForwarding controls IP forwarding for all traffic on OVN-Kubernetes managed interfaces (such as br-ex).
+ By default this is set to Restricted, and Kubernetes related traffic is still forwarded appropriately, but other
+ IP traffic will not be routed by the OCP node. If there is a desire to allow the host to forward traffic across
+ OVN-Kubernetes managed interfaces, then set this field to "Global".
+ The supported values are "Restricted" and "Global".
+ type: string
+ ipv4:
+ description: |-
+ ipv4 allows users to configure IP settings for IPv4 connections. When omitted, this means no opinion and the default
+ configuration is used. Check individual members fields within ipv4 for details of default values.
+ properties:
+ internalMasqueradeSubnet:
+ description: |-
+ internalMasqueradeSubnet contains the masquerade addresses in IPV4 CIDR format used internally by
+ ovn-kubernetes to enable host to service traffic. Each host in the cluster is configured with these
+ addresses, as well as the shared gateway bridge interface. The values can be changed after
+ installation. The subnet chosen should not overlap with other networks specified for
+ OVN-Kubernetes as well as other networks used on the host. Additionally the subnet must
+ be large enough to accommodate 6 IPs (maximum prefix length /29).
+ When omitted, this means no opinion and the platform is left to choose a reasonable default which is subject to change over time.
+ The current default subnet is 169.254.0.0/17
+ The value must be in proper IPV4 CIDR format
+ maxLength: 18
+ type: string
+ x-kubernetes-validations:
+ - message: Subnet must be in valid IPV4 CIDR format
+ rule: isCIDR(self) && cidr(self).ip().family() ==
+ 4
+ - message: subnet must be in the range /0 to /29 inclusive
+ rule: isCIDR(self) && cidr(self).prefixLength()
+ <= 29
+ - message: first IP address octet must not be 0
+ rule: isCIDR(self) && int(self.split('.')[0]) >
+ 0
+ type: object
+ ipv6:
+ description: |-
+ ipv6 allows users to configure IP settings for IPv6 connections. When omitted, this means no opinion and the default
+ configuration is used. Check individual members fields within ipv6 for details of default values.
+ properties:
+ internalMasqueradeSubnet:
+ description: |-
+ internalMasqueradeSubnet contains the masquerade addresses in IPV6 CIDR format used internally by
+ ovn-kubernetes to enable host to service traffic. Each host in the cluster is configured with these
+ addresses, as well as the shared gateway bridge interface. The values can be changed after
+ installation. The subnet chosen should not overlap with other networks specified for
+ OVN-Kubernetes as well as other networks used on the host. Additionally the subnet must
+ be large enough to accommodate 6 IPs (maximum prefix length /125).
+ When omitted, this means no opinion and the platform is left to choose a reasonable default which is subject to change over time.
+ The current default subnet is fd69::/112
+ Note that IPV6 dual addresses are not permitted
+ type: string
+ x-kubernetes-validations:
+ - message: Subnet must be in valid IPV6 CIDR format
+ rule: isCIDR(self) && cidr(self).ip().family() ==
+ 6
+ - message: subnet must be in the range /0 to /125
+ inclusive
+ rule: isCIDR(self) && cidr(self).prefixLength()
+ <= 125
+ type: object
+ routingViaHost:
+ default: false
+ description: |-
+ routingViaHost allows pod egress traffic to exit via the ovn-k8s-mp0 management port
+ into the host before sending it out. If this is not set, traffic will always egress directly
+ from OVN to outside without touching the host stack. Setting this to true means hardware
+ offload will not be supported. Default is false if GatewayConfig is specified.
+ type: boolean
+ type: object
+ genevePort:
+ description: |-
+ geneve port is the UDP port to be used by geneve encapulation.
+ Default is 6081
+ format: int32
+ minimum: 1
+ type: integer
+ hybridOverlayConfig:
+ description: |-
+ hybridOverlayConfig configures an additional overlay network for peers that are
+ not using OVN.
+ properties:
+ hybridClusterNetwork:
+ description: hybridClusterNetwork defines a network space
+ given to nodes on an additional overlay network.
+ items:
+ description: |-
+ ClusterNetworkEntry is a subnet from which to allocate PodIPs. A network of size
+ HostPrefix (in CIDR notation) will be allocated when nodes join the cluster. If
+ the HostPrefix field is not used by the plugin, it can be left unset.
+ Not all network providers support multiple ClusterNetworks
+ properties:
+ cidr:
+ type: string
+ hostPrefix:
+ format: int32
+ minimum: 0
+ type: integer
+ type: object
+ type: array
+ x-kubernetes-list-type: atomic
+ hybridOverlayVXLANPort:
+ description: |-
+ hybridOverlayVXLANPort defines the VXLAN port number to be used by the additional overlay network.
+ Default is 4789
+ format: int32
+ type: integer
+ type: object
+ ipsecConfig:
+ default:
+ mode: Disabled
+ description: |-
+ ipsecConfig enables and configures IPsec for pods on the pod network within the
+ cluster.
+ properties:
+ full:
+ description: |-
+ full defines configuration parameters for the IPsec `Full` mode.
+ This is permitted only when mode is configured with `Full`,
+ and forbidden otherwise.
+ minProperties: 1
+ properties:
+ encapsulation:
+ description: |-
+ encapsulation option to configure libreswan on how inter-pod traffic across nodes
+ are encapsulated to handle NAT traversal. When configured it uses UDP port 4500
+ for the encapsulation.
+ Valid values are Always, Auto and omitted.
+ Always means enable UDP encapsulation regardless of whether NAT is detected.
+ Auto means enable UDP encapsulation based on the detection of NAT.
+ When omitted, this means no opinion and the platform is left to choose a reasonable
+ default, which is subject to change over time. The current default is Auto.
+ enum:
+ - Always
+ - Auto
+ type: string
+ type: object
+ mode:
+ description: |-
+ mode defines the behaviour of the ipsec configuration within the platform.
+ Valid values are `Disabled`, `External` and `Full`.
+ When 'Disabled', ipsec will not be enabled at the node level.
+ When 'External', ipsec is enabled on the node level but requires the user to configure the secure communication parameters.
+ This mode is for external secure communications and the configuration can be done using the k8s-nmstate operator.
+ When 'Full', ipsec is configured on the node level and inter-pod secure communication within the cluster is configured.
+ Note with `Full`, if ipsec is desired for communication with external (to the cluster) entities (such as storage arrays),
+ this is left to the user to configure.
+ enum:
+ - Disabled
+ - External
+ - Full
+ type: string
+ type: object
+ x-kubernetes-validations:
+ - message: ipsecConfig.mode is required
+ rule: self == oldSelf || has(self.mode)
+ - message: full is forbidden when mode is not Full
+ rule: 'has(self.mode) && self.mode == ''Full'' ? true :
+ !has(self.full)'
+ ipv4:
+ description: |-
+ ipv4 allows users to configure IP settings for IPv4 connections. When ommitted,
+ this means no opinions and the default configuration is used. Check individual
+ fields within ipv4 for details of default values.
+ properties:
+ internalJoinSubnet:
+ description: |-
+ internalJoinSubnet is a v4 subnet used internally by ovn-kubernetes in case the
+ default one is being already used by something else. It must not overlap with
+ any other subnet being used by OpenShift or by the node network. The size of the
+ subnet must be larger than the number of nodes.
+ The current default value is 100.64.0.0/16
+ The subnet must be large enough to accommodate one IP per node in your cluster
+ The value must be in proper IPV4 CIDR format
+ maxLength: 18
+ type: string
+ x-kubernetes-validations:
+ - message: Subnet must be in valid IPV4 CIDR format
+ rule: isCIDR(self) && cidr(self).ip().family() == 4
+ - message: subnet must be in the range /0 to /30 inclusive
+ rule: isCIDR(self) && cidr(self).prefixLength() <= 30
+ - message: first IP address octet must not be 0
+ rule: isCIDR(self) && int(self.split('.')[0]) > 0
+ internalTransitSwitchSubnet:
+ description: |-
+ internalTransitSwitchSubnet is a v4 subnet in IPV4 CIDR format used internally
+ by OVN-Kubernetes for the distributed transit switch in the OVN Interconnect
+ architecture that connects the cluster routers on each node together to enable
+ east west traffic. The subnet chosen should not overlap with other networks
+ specified for OVN-Kubernetes as well as other networks used on the host.
+ When ommitted, this means no opinion and the platform is left to choose a reasonable
+ default which is subject to change over time.
+ The current default subnet is 100.88.0.0/16
+ The subnet must be large enough to accommodate one IP per node in your cluster
+ The value must be in proper IPV4 CIDR format
+ maxLength: 18
+ type: string
+ x-kubernetes-validations:
+ - message: Subnet must be in valid IPV4 CIDR format
+ rule: isCIDR(self) && cidr(self).ip().family() == 4
+ - message: subnet must be in the range /0 to /30 inclusive
+ rule: isCIDR(self) && cidr(self).prefixLength() <= 30
+ - message: first IP address octet must not be 0
+ rule: isCIDR(self) && int(self.split('.')[0]) > 0
+ type: object
+ ipv6:
+ description: |-
+ ipv6 allows users to configure IP settings for IPv6 connections. When ommitted,
+ this means no opinions and the default configuration is used. Check individual
+ fields within ipv4 for details of default values.
+ properties:
+ internalJoinSubnet:
+ description: |-
+ internalJoinSubnet is a v6 subnet used internally by ovn-kubernetes in case the
+ default one is being already used by something else. It must not overlap with
+ any other subnet being used by OpenShift or by the node network. The size of the
+ subnet must be larger than the number of nodes.
+ The subnet must be large enough to accommodate one IP per node in your cluster
+ The current default value is fd98::/64
+ The value must be in proper IPV6 CIDR format
+ Note that IPV6 dual addresses are not permitted
+ maxLength: 48
+ type: string
+ x-kubernetes-validations:
+ - message: Subnet must be in valid IPV6 CIDR format
+ rule: isCIDR(self) && cidr(self).ip().family() == 6
+ - message: subnet must be in the range /0 to /125 inclusive
+ rule: isCIDR(self) && cidr(self).prefixLength() <= 125
+ internalTransitSwitchSubnet:
+ description: |-
+ internalTransitSwitchSubnet is a v4 subnet in IPV4 CIDR format used internally
+ by OVN-Kubernetes for the distributed transit switch in the OVN Interconnect
+ architecture that connects the cluster routers on each node together to enable
+ east west traffic. The subnet chosen should not overlap with other networks
+ specified for OVN-Kubernetes as well as other networks used on the host.
+ When ommitted, this means no opinion and the platform is left to choose a reasonable
+ default which is subject to change over time.
+ The subnet must be large enough to accommodate one IP per node in your cluster
+ The current default subnet is fd97::/64
+ The value must be in proper IPV6 CIDR format
+ Note that IPV6 dual addresses are not permitted
+ maxLength: 48
+ type: string
+ x-kubernetes-validations:
+ - message: Subnet must be in valid IPV6 CIDR format
+ rule: isCIDR(self) && cidr(self).ip().family() == 6
+ - message: subnet must be in the range /0 to /125 inclusive
+ rule: isCIDR(self) && cidr(self).prefixLength() <= 125
+ type: object
+ mtu:
+ description: |-
+ mtu is the MTU to use for the tunnel interface. This must be 100
+ bytes smaller than the uplink mtu.
+ Default is 1400
+ format: int32
+ minimum: 0
+ type: integer
+ policyAuditConfig:
+ description: |-
+ policyAuditConfig is the configuration for network policy audit events. If unset,
+ reported defaults are used.
+ properties:
+ destination:
+ default: "null"
+ description: |-
+ destination is the location for policy log messages.
+ Regardless of this config, persistent logs will always be dumped to the host
+ at /var/log/ovn/ however
+ Additionally syslog output may be configured as follows.
+ Valid values are:
+ - "libc" -> to use the libc syslog() function of the host node's journdald process
+ - "udp:host:port" -> for sending syslog over UDP
+ - "unix:file" -> for using the UNIX domain socket directly
+ - "null" -> to discard all messages logged to syslog
+ The default is "null"
+ type: string
+ maxFileSize:
+ default: 50
+ description: |-
+ maxFilesSize is the max size an ACL_audit log file is allowed to reach before rotation occurs
+ Units are in MB and the Default is 50MB
+ format: int32
+ minimum: 1
+ type: integer
+ maxLogFiles:
+ default: 5
+ description: maxLogFiles specifies the maximum number
+ of ACL_audit log files that can be present.
+ format: int32
+ minimum: 1
+ type: integer
+ rateLimit:
+ default: 20
+ description: |-
+ rateLimit is the approximate maximum number of messages to generate per-second per-node. If
+ unset the default of 20 msg/sec is used.
+ format: int32
+ minimum: 1
+ type: integer
+ syslogFacility:
+ default: local0
+ description: syslogFacility the RFC5424 facility for generated
+ messages, e.g. "kern". Default is "local0"
+ type: string
+ type: object
+ routeAdvertisements:
+ description: |-
+ routeAdvertisements determines if the functionality to advertise cluster
+ network routes through a dynamic routing protocol, such as BGP, is
+ enabled or not. This functionality is configured through the
+ ovn-kubernetes RouteAdvertisements CRD. Requires the 'FRR' routing
+ capability provider to be enabled as an additional routing capability.
+ Allowed values are "Enabled", "Disabled" and ommited. When omitted, this
+ means the user has no opinion and the platform is left to choose
+ reasonable defaults. These defaults are subject to change over time. The
+ current default is "Disabled".
+ enum:
+ - ""
+ - Enabled
+ - Disabled
+ type: string
+ v4InternalSubnet:
+ description: |-
+ v4InternalSubnet is a v4 subnet used internally by ovn-kubernetes in case the
+ default one is being already used by something else. It must not overlap with
+ any other subnet being used by OpenShift or by the node network. The size of the
+ subnet must be larger than the number of nodes.
+ Default is 100.64.0.0/16
+ type: string
+ v6InternalSubnet:
+ description: |-
+ v6InternalSubnet is a v6 subnet used internally by ovn-kubernetes in case the
+ default one is being already used by something else. It must not overlap with
+ any other subnet being used by OpenShift or by the node network. The size of the
+ subnet must be larger than the number of nodes.
+ Default is fd98::/64
+ type: string
+ type: object
+ x-kubernetes-validations:
+ - message: defaultNetworkNoOverlayOptions is only supported for
+ no-overlay networks
+ rule: '''self.defaultNetworkTransport == "NoOverlay" || !has(self.defaultNetworkNoOverlayOptions)'''
+ - message: bgpManagedConfig is required when DefaultNetworkTransport
+ is NoOverlay, DefaultNetworkNoOverlayOptions is set and DefaultNetworkNoOverlayOptions.Routing="Managed"
+ rule: '''!(self.defaultNetworkTransport == "NoOverlay" && has(self.defaultNetworkNoOverlayOptions)
+ && self.defaultNetworkNoOverlayOptions.routing == "Managed")
+ || has(self.bgpManagedConfig)'''
+ - message: DefaultNetworkTransport field is immutable
+ rule: '''self.defaultNetworkTransport == oldSelf.defaultNetworkTransport'''
+ - message: defaultNetworkNoOverlayOptions field is immutable
+ rule: '''self.defaultNetworkNoOverlayOptions == oldSelf.defaultNetworkNoOverlayOptions'''
+ - message: bgpManagedConfig field is immutable
+ rule: '''self.bgpManagedConfig == oldSelf.bgpManagedConfig'''
+ type:
+ description: |-
+ type is the type of network
+ All NetworkTypes are supported except for NetworkTypeRaw
+ type: string
+ type: object
+ deployKubeProxy:
+ description: |-
+ deployKubeProxy specifies whether or not a standalone kube-proxy should
+ be deployed by the operator. Some network providers include kube-proxy
+ or similar functionality. If unset, the plugin will attempt to select
+ the correct value, which is false when ovn-kubernetes is used and true
+ otherwise.
+ type: boolean
+ disableMultiNetwork:
+ description: |-
+ disableMultiNetwork defaults to 'false' and this setting enables the pod multi-networking capability.
+ disableMultiNetwork when set to 'true' at cluster install time does not install the components, typically the Multus CNI and the network-attachment-definition CRD,
+ that enable the pod multi-networking capability. Setting the parameter to 'true' might be useful when you need install third-party CNI plugins,
+ but these plugins are not supported by Red Hat. Changing the parameter value as a postinstallation cluster task has no effect.
+ type: boolean
+ disableNetworkDiagnostics:
+ default: false
+ description: |-
+ disableNetworkDiagnostics specifies whether or not PodNetworkConnectivityCheck
+ CRs from a test pod to every node, apiserver and LB should be disabled or not.
+ If unset, this property defaults to 'false' and network diagnostics is enabled.
+ Setting this to 'true' would reduce the additional load of the pods performing the checks.
+ type: boolean
+ exportNetworkFlows:
+ description: |-
+ exportNetworkFlows enables and configures the export of network flow metadata from the pod network
+ by using protocols NetFlow, SFlow or IPFIX. Currently only supported on OVN-Kubernetes plugin.
+ If unset, flows will not be exported to any collector.
+ properties:
+ ipfix:
+ description: ipfix defines IPFIX configuration.
+ properties:
+ collectors:
+ description: ipfixCollectors is list of strings formatted
+ as ip:port with a maximum of ten items
+ items:
+ pattern: ^(([0-9]|[0-9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5])\.){3}([0-9]|[0-9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5]):([1-9][0-9]{0,3}|[1-5][0-9]{4}|6[0-4][0-9]{3}|65[0-4][0-9]{2}|655[0-2][0-9]|6553[0-5])$
+ type: string
+ maxItems: 10
+ minItems: 1
+ type: array
+ x-kubernetes-list-type: atomic
+ type: object
+ netFlow:
+ description: netFlow defines the NetFlow configuration.
+ properties:
+ collectors:
+ description: |-
+ netFlow defines the NetFlow collectors that will consume the flow data exported from OVS.
+ It is a list of strings formatted as ip:port with a maximum of ten items
+ items:
+ pattern: ^(([0-9]|[0-9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5])\.){3}([0-9]|[0-9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5]):([1-9][0-9]{0,3}|[1-5][0-9]{4}|6[0-4][0-9]{3}|65[0-4][0-9]{2}|655[0-2][0-9]|6553[0-5])$
+ type: string
+ maxItems: 10
+ minItems: 1
+ type: array
+ x-kubernetes-list-type: atomic
+ type: object
+ sFlow:
+ description: sFlow defines the SFlow configuration.
+ properties:
+ collectors:
+ description: sFlowCollectors is list of strings formatted
+ as ip:port with a maximum of ten items
+ items:
+ pattern: ^(([0-9]|[0-9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5])\.){3}([0-9]|[0-9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5]):([1-9][0-9]{0,3}|[1-5][0-9]{4}|6[0-4][0-9]{3}|65[0-4][0-9]{2}|655[0-2][0-9]|6553[0-5])$
+ type: string
+ maxItems: 10
+ minItems: 1
+ type: array
+ x-kubernetes-list-type: atomic
+ type: object
+ type: object
+ kubeProxyConfig:
+ description: |-
+ kubeProxyConfig lets us configure desired proxy configuration, if
+ deployKubeProxy is true. If not specified, sensible defaults will be chosen by
+ OpenShift directly.
+ properties:
+ bindAddress:
+ description: |-
+ The address to "bind" on
+ Defaults to 0.0.0.0
+ type: string
+ iptablesSyncPeriod:
+ description: |-
+ An internal kube-proxy parameter. In older releases of OCP, this sometimes needed to be adjusted
+ in large clusters for performance reasons, but this is no longer necessary, and there is no reason
+ to change this from the default value.
+ Default: 30s
+ type: string
+ proxyArguments:
+ additionalProperties:
+ description: ProxyArgumentList is a list of arguments to pass
+ to the kubeproxy process
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: atomic
+ description: Any additional arguments to pass to the kubeproxy
+ process
+ type: object
+ type: object
+ logLevel:
+ default: Normal
+ description: |-
+ logLevel is an intent based logging for an overall component. It does not give fine grained control, but it is a
+ simple way to manage coarse grained logging choices that operators have to interpret for their operands.
+
+ Valid values are: "Normal", "Debug", "Trace", "TraceAll".
+ Defaults to "Normal".
+ enum:
+ - ""
+ - Normal
+ - Debug
+ - Trace
+ - TraceAll
+ type: string
+ managementState:
+ description: managementState indicates whether and how the operator
+ should manage the component
+ pattern: ^(Managed|Unmanaged|Force|Removed)$
+ type: string
+ migration:
+ description: |-
+ migration enables and configures cluster network migration, for network changes
+ that cannot be made instantly.
+ properties:
+ features:
+ description: |-
+ features was previously used to configure which network plugin features
+ would be migrated in a network type migration.
+ DEPRECATED: network type migration is no longer supported, and setting
+ this to a non-empty value will result in the network operator rejecting
+ the configuration.
+ properties:
+ egressFirewall:
+ default: true
+ description: |-
+ egressFirewall specified whether or not the Egress Firewall configuration was migrated.
+ DEPRECATED: network type migration is no longer supported.
+ type: boolean
+ egressIP:
+ default: true
+ description: |-
+ egressIP specified whether or not the Egress IP configuration was migrated.
+ DEPRECATED: network type migration is no longer supported.
+ type: boolean
+ multicast:
+ default: true
+ description: |-
+ multicast specified whether or not the multicast configuration was migrated.
+ DEPRECATED: network type migration is no longer supported.
+ type: boolean
+ type: object
+ mode:
+ description: |-
+ mode indicates the mode of network type migration.
+ DEPRECATED: network type migration is no longer supported, and setting
+ this to a non-empty value will result in the network operator rejecting
+ the configuration.
+ enum:
+ - Live
+ - Offline
+ - ""
+ type: string
+ mtu:
+ description: |-
+ mtu contains the MTU migration configuration. Set this to allow changing
+ the MTU values for the default network. If unset, the operation of
+ changing the MTU for the default network will be rejected.
+ properties:
+ machine:
+ description: |-
+ machine contains MTU migration configuration for the machine's uplink.
+ Needs to be migrated along with the default network MTU unless the
+ current uplink MTU already accommodates the default network MTU.
+ properties:
+ from:
+ description: from is the MTU to migrate from.
+ format: int32
+ minimum: 0
+ type: integer
+ to:
+ description: to is the MTU to migrate to.
+ format: int32
+ minimum: 0
+ type: integer
+ type: object
+ network:
+ description: |-
+ network contains information about MTU migration for the default network.
+ Migrations are only allowed to MTU values lower than the machine's uplink
+ MTU by the minimum appropriate offset.
+ properties:
+ from:
+ description: from is the MTU to migrate from.
+ format: int32
+ minimum: 0
+ type: integer
+ to:
+ description: to is the MTU to migrate to.
+ format: int32
+ minimum: 0
+ type: integer
+ type: object
+ type: object
+ networkType:
+ description: |-
+ networkType was previously used when changing the default network type.
+ DEPRECATED: network type migration is no longer supported, and setting
+ this to a non-empty value will result in the network operator rejecting
+ the configuration.
+ type: string
+ type: object
+ x-kubernetes-validations:
+ - message: networkType migration in mode other than 'Live' may not
+ be configured at the same time as mtu migration
+ rule: '!has(self.mtu) || !has(self.networkType) || self.networkType
+ == "" || has(self.mode) && self.mode == ''Live'''
+ observedConfig:
+ description: |-
+ observedConfig holds a sparse config that controller has observed from the cluster state. It exists in spec because
+ it is an input to the level for the operator
+ nullable: true
+ type: object
+ x-kubernetes-preserve-unknown-fields: true
+ operatorLogLevel:
+ default: Normal
+ description: |-
+ operatorLogLevel is an intent based logging for the operator itself. It does not give fine grained control, but it is a
+ simple way to manage coarse grained logging choices that operators have to interpret for themselves.
+
+ Valid values are: "Normal", "Debug", "Trace", "TraceAll".
+ Defaults to "Normal".
+ enum:
+ - ""
+ - Normal
+ - Debug
+ - Trace
+ - TraceAll
+ type: string
+ serviceNetwork:
+ description: |-
+ serviceNetwork is the ip address pool to use for Service IPs
+ Currently, all existing network providers only support a single value
+ here, but this is an array to allow for growth.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: atomic
+ unsupportedConfigOverrides:
+ description: |-
+ unsupportedConfigOverrides overrides the final configuration that was computed by the operator.
+ Red Hat does not support the use of this field.
+ Misuse of this field could lead to unexpected behavior or conflict with other configuration options.
+ Seek guidance from the Red Hat support before using this field.
+ Use of this property blocks cluster upgrades, it must be removed before upgrading your cluster.
+ nullable: true
+ type: object
+ x-kubernetes-preserve-unknown-fields: true
+ useMultiNetworkPolicy:
+ description: |-
+ useMultiNetworkPolicy enables a controller which allows for
+ MultiNetworkPolicy objects to be used on additional networks as
+ created by Multus CNI. MultiNetworkPolicy are similar to NetworkPolicy
+ objects, but NetworkPolicy objects only apply to the primary interface.
+ With MultiNetworkPolicy, you can control the traffic that a pod can receive
+ over the secondary interfaces. If unset, this property defaults to 'false'
+ and MultiNetworkPolicy objects are ignored. If 'disableMultiNetwork' is
+ 'true' then the value of this field is ignored.
+ type: boolean
+ type: object
+ x-kubernetes-validations:
+ - message: Route advertisements cannot be Enabled if 'FRR' routing capability
+ provider is not available
+ rule: (has(self.additionalRoutingCapabilities) && ('FRR' in self.additionalRoutingCapabilities.providers))
+ || !has(self.defaultNetwork) || !has(self.defaultNetwork.ovnKubernetesConfig)
+ || !has(self.defaultNetwork.ovnKubernetesConfig.routeAdvertisements)
+ || self.defaultNetwork.ovnKubernetesConfig.routeAdvertisements !=
+ 'Enabled'
+ - message: invalid value for IPForwarding, valid values are 'Restricted'
+ or 'Global'
+ rule: '!has(self.defaultNetwork) || !has(self.defaultNetwork.ovnKubernetesConfig)
+ || !has(self.defaultNetwork.ovnKubernetesConfig.gatewayConfig) ||
+ !has(self.defaultNetwork.ovnKubernetesConfig.gatewayConfig.ipForwarding)
+ || self.defaultNetwork.ovnKubernetesConfig.gatewayConfig.ipForwarding
+ == oldSelf.defaultNetwork.ovnKubernetesConfig.gatewayConfig.ipForwarding
+ || self.defaultNetwork.ovnKubernetesConfig.gatewayConfig.ipForwarding
+ == ''Restricted'' || self.defaultNetwork.ovnKubernetesConfig.gatewayConfig.ipForwarding
+ == ''Global'''
+ status:
+ description: |-
+ NetworkStatus is detailed operator status, which is distilled
+ up to the Network clusteroperator object.
+ properties:
+ conditions:
+ description: conditions is a list of conditions and their status
+ items:
+ description: OperatorCondition is just the standard condition fields.
+ properties:
+ lastTransitionTime:
+ description: |-
+ lastTransitionTime is the last time the condition transitioned from one status to another.
+ This should be when the underlying condition changed. If that is not known, then using the time when the API field changed is acceptable.
+ format: date-time
+ type: string
+ message:
+ type: string
+ reason:
+ type: string
+ status:
+ description: status of the condition, one of True, False, Unknown.
+ enum:
+ - "True"
+ - "False"
+ - Unknown
+ type: string
+ type:
+ description: type of condition in CamelCase or in foo.example.com/CamelCase.
+ maxLength: 316
+ pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$
+ type: string
+ required:
+ - lastTransitionTime
+ - status
+ - type
+ type: object
+ type: array
+ x-kubernetes-list-map-keys:
+ - type
+ x-kubernetes-list-type: map
+ generations:
+ description: generations are used to determine when an item needs
+ to be reconciled or has changed in a way that needs a reaction.
+ items:
+ description: GenerationStatus keeps track of the generation for
+ a given resource so that decisions about forced updates can be
+ made.
+ properties:
+ group:
+ description: group is the group of the thing you're tracking
+ type: string
+ hash:
+ description: hash is an optional field set for resources without
+ generation that are content sensitive like secrets and configmaps
+ type: string
+ lastGeneration:
+ description: lastGeneration is the last generation of the workload
+ controller involved
+ format: int64
+ type: integer
+ name:
+ description: name is the name of the thing you're tracking
+ type: string
+ namespace:
+ description: namespace is where the thing you're tracking is
+ type: string
+ resource:
+ description: resource is the resource type of the thing you're
+ tracking
+ type: string
+ required:
+ - group
+ - name
+ - namespace
+ - resource
+ type: object
+ type: array
+ x-kubernetes-list-map-keys:
+ - group
+ - resource
+ - namespace
+ - name
+ x-kubernetes-list-type: map
+ latestAvailableRevision:
+ description: latestAvailableRevision is the deploymentID of the most
+ recent deployment
+ format: int32
+ type: integer
+ x-kubernetes-validations:
+ - message: must only increase
+ rule: self >= oldSelf
+ observedGeneration:
+ description: observedGeneration is the last generation change you've
+ dealt with
+ format: int64
+ type: integer
+ readyReplicas:
+ description: readyReplicas indicates how many replicas are ready and
+ at the desired state
+ format: int32
+ type: integer
+ version:
+ description: version is the level this availability applies to
+ type: string
+ type: object
+ type: object
+ served: true
+ storage: true
+ subresources:
+ status: {}
diff --git a/operator/v1/zz_generated.crd-manifests/0000_70_network_01_networks-TechPreviewNoUpgrade.crd.yaml b/operator/v1/zz_generated.crd-manifests/0000_70_network_01_networks-TechPreviewNoUpgrade.crd.yaml
new file mode 100644
index 00000000000..4ab9443ab19
--- /dev/null
+++ b/operator/v1/zz_generated.crd-manifests/0000_70_network_01_networks-TechPreviewNoUpgrade.crd.yaml
@@ -0,0 +1,1136 @@
+apiVersion: apiextensions.k8s.io/v1
+kind: CustomResourceDefinition
+metadata:
+ annotations:
+ api-approved.openshift.io: https://github.com/openshift/api/pull/475
+ api.openshift.io/merged-by-featuregates: "true"
+ include.release.openshift.io/ibm-cloud-managed: "true"
+ include.release.openshift.io/self-managed-high-availability: "true"
+ release.openshift.io/feature-set: TechPreviewNoUpgrade
+ name: networks.operator.openshift.io
+spec:
+ group: operator.openshift.io
+ names:
+ kind: Network
+ listKind: NetworkList
+ plural: networks
+ singular: network
+ scope: Cluster
+ versions:
+ - name: v1
+ schema:
+ openAPIV3Schema:
+ description: |-
+ Network describes the cluster's desired network configuration. It is
+ consumed by the cluster-network-operator.
+
+ Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
+ properties:
+ apiVersion:
+ description: |-
+ APIVersion defines the versioned schema of this representation of an object.
+ Servers should convert recognized schemas to the latest internal value, and
+ may reject unrecognized values.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
+ type: string
+ kind:
+ description: |-
+ Kind is a string value representing the REST resource this object represents.
+ Servers may infer this from the endpoint the client submits requests to.
+ Cannot be updated.
+ In CamelCase.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
+ type: string
+ metadata:
+ type: object
+ spec:
+ description: NetworkSpec is the top-level network configuration object.
+ properties:
+ additionalNetworks:
+ description: |-
+ additionalNetworks is a list of extra networks to make available to pods
+ when multiple networks are enabled.
+ items:
+ description: |-
+ AdditionalNetworkDefinition configures an extra network that is available but not
+ created by default. Instead, pods must request them by name.
+ type must be specified, along with exactly one "Config" that matches the type.
+ properties:
+ name:
+ description: |-
+ name is the name of the network. This will be populated in the resulting CRD
+ This must be unique.
+ type: string
+ namespace:
+ description: |-
+ namespace is the namespace of the network. This will be populated in the resulting CRD
+ If not given the network will be created in the default namespace.
+ type: string
+ rawCNIConfig:
+ description: |-
+ rawCNIConfig is the raw CNI configuration json to create in the
+ NetworkAttachmentDefinition CRD
+ type: string
+ simpleMacvlanConfig:
+ description: simpleMacvlanConfig configures the macvlan interface
+ in case of type:NetworkTypeSimpleMacvlan
+ properties:
+ ipamConfig:
+ description: ipamConfig configures IPAM module will be used
+ for IP Address Management (IPAM).
+ properties:
+ staticIPAMConfig:
+ description: staticIPAMConfig configures the static
+ IP address in case of type:IPAMTypeStatic
+ properties:
+ addresses:
+ description: addresses configures IP address for
+ the interface
+ items:
+ description: StaticIPAMAddresses provides IP address
+ and Gateway for static IPAM addresses
+ properties:
+ address:
+ description: address is the IP address in
+ CIDR format
+ type: string
+ gateway:
+ description: gateway is IP inside of subnet
+ to designate as the gateway
+ type: string
+ type: object
+ type: array
+ x-kubernetes-list-type: atomic
+ dns:
+ description: dns configures DNS for the interface
+ properties:
+ domain:
+ description: domain configures the domainname
+ the local domain used for short hostname lookups
+ type: string
+ nameservers:
+ description: nameservers points DNS servers
+ for IP lookup
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: atomic
+ search:
+ description: search configures priority ordered
+ search domains for short hostname lookups
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: atomic
+ type: object
+ routes:
+ description: routes configures IP routes for the
+ interface
+ items:
+ description: StaticIPAMRoutes provides Destination/Gateway
+ pairs for static IPAM routes
+ properties:
+ destination:
+ description: destination points the IP route
+ destination
+ type: string
+ gateway:
+ description: |-
+ gateway is the route's next-hop IP address
+ If unset, a default gateway is assumed (as determined by the CNI plugin).
+ type: string
+ type: object
+ type: array
+ x-kubernetes-list-type: atomic
+ type: object
+ type:
+ description: |-
+ type is the type of IPAM module will be used for IP Address Management(IPAM).
+ The supported values are IPAMTypeDHCP, IPAMTypeStatic
+ type: string
+ type: object
+ master:
+ description: |-
+ master is the host interface to create the macvlan interface from.
+ If not specified, it will be default route interface
+ type: string
+ mode:
+ description: 'mode is the macvlan mode: bridge, private,
+ vepa, passthru. The default is bridge'
+ type: string
+ mtu:
+ description: |-
+ mtu is the mtu to use for the macvlan interface. if unset, host's
+ kernel will select the value.
+ format: int32
+ minimum: 0
+ type: integer
+ type: object
+ type:
+ description: |-
+ type is the type of network
+ The supported values are NetworkTypeRaw, NetworkTypeSimpleMacvlan
+ type: string
+ required:
+ - name
+ type: object
+ type: array
+ x-kubernetes-list-map-keys:
+ - name
+ x-kubernetes-list-type: map
+ additionalRoutingCapabilities:
+ description: |-
+ additionalRoutingCapabilities describes components and relevant
+ configuration providing additional routing capabilities. When set, it
+ enables such components and the usage of the routing capabilities they
+ provide for the machine network. Upstream operators, like MetalLB
+ operator, requiring these capabilities may rely on, or automatically set
+ this attribute. Network plugins may leverage advanced routing
+ capabilities acquired through the enablement of these components but may
+ require specific configuration on their side to do so; refer to their
+ respective documentation and configuration options.
+ properties:
+ providers:
+ description: |-
+ providers is a set of enabled components that provide additional routing
+ capabilities. Entries on this list must be unique. The only valid value
+ is currrently "FRR" which provides FRR routing capabilities through the
+ deployment of FRR.
+ items:
+ description: RoutingCapabilitiesProvider is a component providing
+ routing capabilities.
+ enum:
+ - FRR
+ type: string
+ maxItems: 1
+ minItems: 1
+ type: array
+ x-kubernetes-list-type: atomic
+ x-kubernetes-validations:
+ - rule: self.all(x, self.exists_one(y, x == y))
+ required:
+ - providers
+ type: object
+ clusterNetwork:
+ description: |-
+ clusterNetwork is the IP address pool to use for pod IPs.
+ Some network providers support multiple ClusterNetworks.
+ Others only support one. This is equivalent to the cluster-cidr.
+ items:
+ description: |-
+ ClusterNetworkEntry is a subnet from which to allocate PodIPs. A network of size
+ HostPrefix (in CIDR notation) will be allocated when nodes join the cluster. If
+ the HostPrefix field is not used by the plugin, it can be left unset.
+ Not all network providers support multiple ClusterNetworks
+ properties:
+ cidr:
+ type: string
+ hostPrefix:
+ format: int32
+ minimum: 0
+ type: integer
+ type: object
+ type: array
+ x-kubernetes-list-type: atomic
+ defaultNetwork:
+ description: defaultNetwork is the "default" network that all pods
+ will receive
+ properties:
+ openshiftSDNConfig:
+ description: |-
+ openshiftSDNConfig was previously used to configure the openshift-sdn plugin.
+ DEPRECATED: OpenShift SDN is no longer supported.
+ properties:
+ enableUnidling:
+ description: |-
+ enableUnidling controls whether or not the service proxy will support idling
+ and unidling of services. By default, unidling is enabled.
+ type: boolean
+ mode:
+ description: mode is one of "Multitenant", "Subnet", or "NetworkPolicy"
+ type: string
+ mtu:
+ description: |-
+ mtu is the mtu to use for the tunnel interface. Defaults to 1450 if unset.
+ This must be 50 bytes smaller than the machine's uplink.
+ format: int32
+ minimum: 0
+ type: integer
+ useExternalOpenvswitch:
+ description: |-
+ useExternalOpenvswitch used to control whether the operator would deploy an OVS
+ DaemonSet itself or expect someone else to start OVS. As of 4.6, OVS is always
+ run as a system service, and this flag is ignored.
+ type: boolean
+ vxlanPort:
+ description: vxlanPort is the port to use for all vxlan packets.
+ The default is 4789.
+ format: int32
+ minimum: 0
+ type: integer
+ type: object
+ ovnKubernetesConfig:
+ description: ovnKubernetesConfig configures the ovn-kubernetes
+ plugin.
+ properties:
+ bgpManagedConfig:
+ description: |-
+ bgpManagedConfig configures the BGP properties for networks (default network or CUDNs)
+ in no-overlay mode that specify routing="Managed" in their NoOverlayOptions.
+ It is required when DefaultNetworkNoOverlayOptions.Routing is set to "Managed".
+ When omitted, this means the user does not configure BGP for managed routing.
+ properties:
+ asNumber:
+ description: |-
+ asNumber is the 2-byte or 4-byte Autonomous System Number (ASN)
+ to be used in the generated FRR configuration. It is required
+ when NoOverlayOptions.Routing is "Managed".
+ Valid values are 1 to 4294967295.
+ format: int32
+ maximum: 4294967295
+ minimum: 1
+ type: integer
+ bgpTopology:
+ default: fullMesh
+ description: |-
+ bgpTopology defines the BGP topology to be used.
+ Allowed values are "fullMesh".
+ When set to "fullMesh", every node deploys a BGP router, forming a BGP full mesh.
+ When omitted, this means the user has no opinion and the platform chooses a reasonable default which is subject to change over time.
+ The current default is "fullMesh".
+ enum:
+ - fullMesh
+ type: string
+ required:
+ - asNumber
+ type: object
+ defaultNetworkNoOverlayOptions:
+ description: |-
+ defaultNetworkNoOverlayOptions contains configuration for no-overlay mode for the default network.
+ It is required when DefaultNetworkTransport is "NoOverlay".
+ When omitted, this means the user does not configure no-overlay mode options.
+ properties:
+ outboundSNAT:
+ description: |-
+ outboundSNAT defines the SNAT behavior for outbound traffic from pods.
+ Allowed values are "Enable" and "Disable".
+ When set to "Enable", SNAT is performed on outbound traffic from pods.
+ When set to "Disable", SNAT is not performed and pod IPs are preserved in outbound traffic.
+ This field is required when the network operates in no-overlay mode.
+ enum:
+ - Enable
+ - Disable
+ type: string
+ routing:
+ description: |-
+ routing specifies whether the pod network routing is managed by OVN-Kubernetes or users.
+ Allowed values are "Managed" and "Unmanaged".
+ When set to "Managed", OVN-Kubernetes manages the pod network routing configuration through BGP.
+ When set to "Unmanaged", users are responsible for configuring the pod network routing.
+ This field is required when the network operates in no-overlay mode.
+ enum:
+ - Managed
+ - Unmanaged
+ type: string
+ required:
+ - outboundSNAT
+ - routing
+ type: object
+ defaultNetworkTransport:
+ default: Geneve
+ description: |-
+ defaultNetworkTransport describes the transport protocol for east-west traffic for the default network.
+ Allowed values are "NoOverlay" and "Geneve".
+ When set to "NoOverlay", the default network operates in no-overlay mode.
+ When set to "Geneve", the default network uses Geneve overlay.
+ When omitted, this means the user has no opinion and the platform chooses a reasonable default which is subject to change over time.
+ The current default is "Geneve".
+ enum:
+ - NoOverlay
+ - Geneve
+ type: string
+ egressIPConfig:
+ description: egressIPConfig holds the configuration for EgressIP
+ options.
+ properties:
+ reachabilityTotalTimeoutSeconds:
+ description: |-
+ reachabilityTotalTimeout configures the EgressIP node reachability check total timeout in seconds.
+ If the EgressIP node cannot be reached within this timeout, the node is declared down.
+ Setting a large value may cause the EgressIP feature to react slowly to node changes.
+ In particular, it may react slowly for EgressIP nodes that really have a genuine problem and are unreachable.
+ When omitted, this means the user has no opinion and the platform is left to choose a reasonable default, which is subject to change over time.
+ The current default is 1 second.
+ A value of 0 disables the EgressIP node's reachability check.
+ format: int32
+ maximum: 60
+ minimum: 0
+ type: integer
+ type: object
+ gatewayConfig:
+ description: gatewayConfig holds the configuration for node
+ gateway options.
+ properties:
+ ipForwarding:
+ description: |-
+ ipForwarding controls IP forwarding for all traffic on OVN-Kubernetes managed interfaces (such as br-ex).
+ By default this is set to Restricted, and Kubernetes related traffic is still forwarded appropriately, but other
+ IP traffic will not be routed by the OCP node. If there is a desire to allow the host to forward traffic across
+ OVN-Kubernetes managed interfaces, then set this field to "Global".
+ The supported values are "Restricted" and "Global".
+ type: string
+ ipv4:
+ description: |-
+ ipv4 allows users to configure IP settings for IPv4 connections. When omitted, this means no opinion and the default
+ configuration is used. Check individual members fields within ipv4 for details of default values.
+ properties:
+ internalMasqueradeSubnet:
+ description: |-
+ internalMasqueradeSubnet contains the masquerade addresses in IPV4 CIDR format used internally by
+ ovn-kubernetes to enable host to service traffic. Each host in the cluster is configured with these
+ addresses, as well as the shared gateway bridge interface. The values can be changed after
+ installation. The subnet chosen should not overlap with other networks specified for
+ OVN-Kubernetes as well as other networks used on the host. Additionally the subnet must
+ be large enough to accommodate 6 IPs (maximum prefix length /29).
+ When omitted, this means no opinion and the platform is left to choose a reasonable default which is subject to change over time.
+ The current default subnet is 169.254.0.0/17
+ The value must be in proper IPV4 CIDR format
+ maxLength: 18
+ type: string
+ x-kubernetes-validations:
+ - message: Subnet must be in valid IPV4 CIDR format
+ rule: isCIDR(self) && cidr(self).ip().family() ==
+ 4
+ - message: subnet must be in the range /0 to /29 inclusive
+ rule: isCIDR(self) && cidr(self).prefixLength()
+ <= 29
+ - message: first IP address octet must not be 0
+ rule: isCIDR(self) && int(self.split('.')[0]) >
+ 0
+ type: object
+ ipv6:
+ description: |-
+ ipv6 allows users to configure IP settings for IPv6 connections. When omitted, this means no opinion and the default
+ configuration is used. Check individual members fields within ipv6 for details of default values.
+ properties:
+ internalMasqueradeSubnet:
+ description: |-
+ internalMasqueradeSubnet contains the masquerade addresses in IPV6 CIDR format used internally by
+ ovn-kubernetes to enable host to service traffic. Each host in the cluster is configured with these
+ addresses, as well as the shared gateway bridge interface. The values can be changed after
+ installation. The subnet chosen should not overlap with other networks specified for
+ OVN-Kubernetes as well as other networks used on the host. Additionally the subnet must
+ be large enough to accommodate 6 IPs (maximum prefix length /125).
+ When omitted, this means no opinion and the platform is left to choose a reasonable default which is subject to change over time.
+ The current default subnet is fd69::/112
+ Note that IPV6 dual addresses are not permitted
+ type: string
+ x-kubernetes-validations:
+ - message: Subnet must be in valid IPV6 CIDR format
+ rule: isCIDR(self) && cidr(self).ip().family() ==
+ 6
+ - message: subnet must be in the range /0 to /125
+ inclusive
+ rule: isCIDR(self) && cidr(self).prefixLength()
+ <= 125
+ type: object
+ routingViaHost:
+ default: false
+ description: |-
+ routingViaHost allows pod egress traffic to exit via the ovn-k8s-mp0 management port
+ into the host before sending it out. If this is not set, traffic will always egress directly
+ from OVN to outside without touching the host stack. Setting this to true means hardware
+ offload will not be supported. Default is false if GatewayConfig is specified.
+ type: boolean
+ type: object
+ genevePort:
+ description: |-
+ geneve port is the UDP port to be used by geneve encapulation.
+ Default is 6081
+ format: int32
+ minimum: 1
+ type: integer
+ hybridOverlayConfig:
+ description: |-
+ hybridOverlayConfig configures an additional overlay network for peers that are
+ not using OVN.
+ properties:
+ hybridClusterNetwork:
+ description: hybridClusterNetwork defines a network space
+ given to nodes on an additional overlay network.
+ items:
+ description: |-
+ ClusterNetworkEntry is a subnet from which to allocate PodIPs. A network of size
+ HostPrefix (in CIDR notation) will be allocated when nodes join the cluster. If
+ the HostPrefix field is not used by the plugin, it can be left unset.
+ Not all network providers support multiple ClusterNetworks
+ properties:
+ cidr:
+ type: string
+ hostPrefix:
+ format: int32
+ minimum: 0
+ type: integer
+ type: object
+ type: array
+ x-kubernetes-list-type: atomic
+ hybridOverlayVXLANPort:
+ description: |-
+ hybridOverlayVXLANPort defines the VXLAN port number to be used by the additional overlay network.
+ Default is 4789
+ format: int32
+ type: integer
+ type: object
+ ipsecConfig:
+ default:
+ mode: Disabled
+ description: |-
+ ipsecConfig enables and configures IPsec for pods on the pod network within the
+ cluster.
+ properties:
+ full:
+ description: |-
+ full defines configuration parameters for the IPsec `Full` mode.
+ This is permitted only when mode is configured with `Full`,
+ and forbidden otherwise.
+ minProperties: 1
+ properties:
+ encapsulation:
+ description: |-
+ encapsulation option to configure libreswan on how inter-pod traffic across nodes
+ are encapsulated to handle NAT traversal. When configured it uses UDP port 4500
+ for the encapsulation.
+ Valid values are Always, Auto and omitted.
+ Always means enable UDP encapsulation regardless of whether NAT is detected.
+ Auto means enable UDP encapsulation based on the detection of NAT.
+ When omitted, this means no opinion and the platform is left to choose a reasonable
+ default, which is subject to change over time. The current default is Auto.
+ enum:
+ - Always
+ - Auto
+ type: string
+ type: object
+ mode:
+ description: |-
+ mode defines the behaviour of the ipsec configuration within the platform.
+ Valid values are `Disabled`, `External` and `Full`.
+ When 'Disabled', ipsec will not be enabled at the node level.
+ When 'External', ipsec is enabled on the node level but requires the user to configure the secure communication parameters.
+ This mode is for external secure communications and the configuration can be done using the k8s-nmstate operator.
+ When 'Full', ipsec is configured on the node level and inter-pod secure communication within the cluster is configured.
+ Note with `Full`, if ipsec is desired for communication with external (to the cluster) entities (such as storage arrays),
+ this is left to the user to configure.
+ enum:
+ - Disabled
+ - External
+ - Full
+ type: string
+ type: object
+ x-kubernetes-validations:
+ - message: ipsecConfig.mode is required
+ rule: self == oldSelf || has(self.mode)
+ - message: full is forbidden when mode is not Full
+ rule: 'has(self.mode) && self.mode == ''Full'' ? true :
+ !has(self.full)'
+ ipv4:
+ description: |-
+ ipv4 allows users to configure IP settings for IPv4 connections. When ommitted,
+ this means no opinions and the default configuration is used. Check individual
+ fields within ipv4 for details of default values.
+ properties:
+ internalJoinSubnet:
+ description: |-
+ internalJoinSubnet is a v4 subnet used internally by ovn-kubernetes in case the
+ default one is being already used by something else. It must not overlap with
+ any other subnet being used by OpenShift or by the node network. The size of the
+ subnet must be larger than the number of nodes.
+ The current default value is 100.64.0.0/16
+ The subnet must be large enough to accommodate one IP per node in your cluster
+ The value must be in proper IPV4 CIDR format
+ maxLength: 18
+ type: string
+ x-kubernetes-validations:
+ - message: Subnet must be in valid IPV4 CIDR format
+ rule: isCIDR(self) && cidr(self).ip().family() == 4
+ - message: subnet must be in the range /0 to /30 inclusive
+ rule: isCIDR(self) && cidr(self).prefixLength() <= 30
+ - message: first IP address octet must not be 0
+ rule: isCIDR(self) && int(self.split('.')[0]) > 0
+ internalTransitSwitchSubnet:
+ description: |-
+ internalTransitSwitchSubnet is a v4 subnet in IPV4 CIDR format used internally
+ by OVN-Kubernetes for the distributed transit switch in the OVN Interconnect
+ architecture that connects the cluster routers on each node together to enable
+ east west traffic. The subnet chosen should not overlap with other networks
+ specified for OVN-Kubernetes as well as other networks used on the host.
+ When ommitted, this means no opinion and the platform is left to choose a reasonable
+ default which is subject to change over time.
+ The current default subnet is 100.88.0.0/16
+ The subnet must be large enough to accommodate one IP per node in your cluster
+ The value must be in proper IPV4 CIDR format
+ maxLength: 18
+ type: string
+ x-kubernetes-validations:
+ - message: Subnet must be in valid IPV4 CIDR format
+ rule: isCIDR(self) && cidr(self).ip().family() == 4
+ - message: subnet must be in the range /0 to /30 inclusive
+ rule: isCIDR(self) && cidr(self).prefixLength() <= 30
+ - message: first IP address octet must not be 0
+ rule: isCIDR(self) && int(self.split('.')[0]) > 0
+ type: object
+ ipv6:
+ description: |-
+ ipv6 allows users to configure IP settings for IPv6 connections. When ommitted,
+ this means no opinions and the default configuration is used. Check individual
+ fields within ipv4 for details of default values.
+ properties:
+ internalJoinSubnet:
+ description: |-
+ internalJoinSubnet is a v6 subnet used internally by ovn-kubernetes in case the
+ default one is being already used by something else. It must not overlap with
+ any other subnet being used by OpenShift or by the node network. The size of the
+ subnet must be larger than the number of nodes.
+ The subnet must be large enough to accommodate one IP per node in your cluster
+ The current default value is fd98::/64
+ The value must be in proper IPV6 CIDR format
+ Note that IPV6 dual addresses are not permitted
+ maxLength: 48
+ type: string
+ x-kubernetes-validations:
+ - message: Subnet must be in valid IPV6 CIDR format
+ rule: isCIDR(self) && cidr(self).ip().family() == 6
+ - message: subnet must be in the range /0 to /125 inclusive
+ rule: isCIDR(self) && cidr(self).prefixLength() <= 125
+ internalTransitSwitchSubnet:
+ description: |-
+ internalTransitSwitchSubnet is a v4 subnet in IPV4 CIDR format used internally
+ by OVN-Kubernetes for the distributed transit switch in the OVN Interconnect
+ architecture that connects the cluster routers on each node together to enable
+ east west traffic. The subnet chosen should not overlap with other networks
+ specified for OVN-Kubernetes as well as other networks used on the host.
+ When ommitted, this means no opinion and the platform is left to choose a reasonable
+ default which is subject to change over time.
+ The subnet must be large enough to accommodate one IP per node in your cluster
+ The current default subnet is fd97::/64
+ The value must be in proper IPV6 CIDR format
+ Note that IPV6 dual addresses are not permitted
+ maxLength: 48
+ type: string
+ x-kubernetes-validations:
+ - message: Subnet must be in valid IPV6 CIDR format
+ rule: isCIDR(self) && cidr(self).ip().family() == 6
+ - message: subnet must be in the range /0 to /125 inclusive
+ rule: isCIDR(self) && cidr(self).prefixLength() <= 125
+ type: object
+ mtu:
+ description: |-
+ mtu is the MTU to use for the tunnel interface. This must be 100
+ bytes smaller than the uplink mtu.
+ Default is 1400
+ format: int32
+ minimum: 0
+ type: integer
+ policyAuditConfig:
+ description: |-
+ policyAuditConfig is the configuration for network policy audit events. If unset,
+ reported defaults are used.
+ properties:
+ destination:
+ default: "null"
+ description: |-
+ destination is the location for policy log messages.
+ Regardless of this config, persistent logs will always be dumped to the host
+ at /var/log/ovn/ however
+ Additionally syslog output may be configured as follows.
+ Valid values are:
+ - "libc" -> to use the libc syslog() function of the host node's journdald process
+ - "udp:host:port" -> for sending syslog over UDP
+ - "unix:file" -> for using the UNIX domain socket directly
+ - "null" -> to discard all messages logged to syslog
+ The default is "null"
+ type: string
+ maxFileSize:
+ default: 50
+ description: |-
+ maxFilesSize is the max size an ACL_audit log file is allowed to reach before rotation occurs
+ Units are in MB and the Default is 50MB
+ format: int32
+ minimum: 1
+ type: integer
+ maxLogFiles:
+ default: 5
+ description: maxLogFiles specifies the maximum number
+ of ACL_audit log files that can be present.
+ format: int32
+ minimum: 1
+ type: integer
+ rateLimit:
+ default: 20
+ description: |-
+ rateLimit is the approximate maximum number of messages to generate per-second per-node. If
+ unset the default of 20 msg/sec is used.
+ format: int32
+ minimum: 1
+ type: integer
+ syslogFacility:
+ default: local0
+ description: syslogFacility the RFC5424 facility for generated
+ messages, e.g. "kern". Default is "local0"
+ type: string
+ type: object
+ routeAdvertisements:
+ description: |-
+ routeAdvertisements determines if the functionality to advertise cluster
+ network routes through a dynamic routing protocol, such as BGP, is
+ enabled or not. This functionality is configured through the
+ ovn-kubernetes RouteAdvertisements CRD. Requires the 'FRR' routing
+ capability provider to be enabled as an additional routing capability.
+ Allowed values are "Enabled", "Disabled" and ommited. When omitted, this
+ means the user has no opinion and the platform is left to choose
+ reasonable defaults. These defaults are subject to change over time. The
+ current default is "Disabled".
+ enum:
+ - ""
+ - Enabled
+ - Disabled
+ type: string
+ v4InternalSubnet:
+ description: |-
+ v4InternalSubnet is a v4 subnet used internally by ovn-kubernetes in case the
+ default one is being already used by something else. It must not overlap with
+ any other subnet being used by OpenShift or by the node network. The size of the
+ subnet must be larger than the number of nodes.
+ Default is 100.64.0.0/16
+ type: string
+ v6InternalSubnet:
+ description: |-
+ v6InternalSubnet is a v6 subnet used internally by ovn-kubernetes in case the
+ default one is being already used by something else. It must not overlap with
+ any other subnet being used by OpenShift or by the node network. The size of the
+ subnet must be larger than the number of nodes.
+ Default is fd98::/64
+ type: string
+ type: object
+ x-kubernetes-validations:
+ - message: defaultNetworkNoOverlayOptions is only supported for
+ no-overlay networks
+ rule: '''self.defaultNetworkTransport == "NoOverlay" || !has(self.defaultNetworkNoOverlayOptions)'''
+ - message: bgpManagedConfig is required when DefaultNetworkTransport
+ is NoOverlay, DefaultNetworkNoOverlayOptions is set and DefaultNetworkNoOverlayOptions.Routing="Managed"
+ rule: '''!(self.defaultNetworkTransport == "NoOverlay" && has(self.defaultNetworkNoOverlayOptions)
+ && self.defaultNetworkNoOverlayOptions.routing == "Managed")
+ || has(self.bgpManagedConfig)'''
+ - message: DefaultNetworkTransport field is immutable
+ rule: '''self.defaultNetworkTransport == oldSelf.defaultNetworkTransport'''
+ - message: defaultNetworkNoOverlayOptions field is immutable
+ rule: '''self.defaultNetworkNoOverlayOptions == oldSelf.defaultNetworkNoOverlayOptions'''
+ - message: bgpManagedConfig field is immutable
+ rule: '''self.bgpManagedConfig == oldSelf.bgpManagedConfig'''
+ type:
+ description: |-
+ type is the type of network
+ All NetworkTypes are supported except for NetworkTypeRaw
+ type: string
+ type: object
+ deployKubeProxy:
+ description: |-
+ deployKubeProxy specifies whether or not a standalone kube-proxy should
+ be deployed by the operator. Some network providers include kube-proxy
+ or similar functionality. If unset, the plugin will attempt to select
+ the correct value, which is false when ovn-kubernetes is used and true
+ otherwise.
+ type: boolean
+ disableMultiNetwork:
+ description: |-
+ disableMultiNetwork defaults to 'false' and this setting enables the pod multi-networking capability.
+ disableMultiNetwork when set to 'true' at cluster install time does not install the components, typically the Multus CNI and the network-attachment-definition CRD,
+ that enable the pod multi-networking capability. Setting the parameter to 'true' might be useful when you need install third-party CNI plugins,
+ but these plugins are not supported by Red Hat. Changing the parameter value as a postinstallation cluster task has no effect.
+ type: boolean
+ disableNetworkDiagnostics:
+ default: false
+ description: |-
+ disableNetworkDiagnostics specifies whether or not PodNetworkConnectivityCheck
+ CRs from a test pod to every node, apiserver and LB should be disabled or not.
+ If unset, this property defaults to 'false' and network diagnostics is enabled.
+ Setting this to 'true' would reduce the additional load of the pods performing the checks.
+ type: boolean
+ exportNetworkFlows:
+ description: |-
+ exportNetworkFlows enables and configures the export of network flow metadata from the pod network
+ by using protocols NetFlow, SFlow or IPFIX. Currently only supported on OVN-Kubernetes plugin.
+ If unset, flows will not be exported to any collector.
+ properties:
+ ipfix:
+ description: ipfix defines IPFIX configuration.
+ properties:
+ collectors:
+ description: ipfixCollectors is list of strings formatted
+ as ip:port with a maximum of ten items
+ items:
+ pattern: ^(([0-9]|[0-9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5])\.){3}([0-9]|[0-9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5]):([1-9][0-9]{0,3}|[1-5][0-9]{4}|6[0-4][0-9]{3}|65[0-4][0-9]{2}|655[0-2][0-9]|6553[0-5])$
+ type: string
+ maxItems: 10
+ minItems: 1
+ type: array
+ x-kubernetes-list-type: atomic
+ type: object
+ netFlow:
+ description: netFlow defines the NetFlow configuration.
+ properties:
+ collectors:
+ description: |-
+ netFlow defines the NetFlow collectors that will consume the flow data exported from OVS.
+ It is a list of strings formatted as ip:port with a maximum of ten items
+ items:
+ pattern: ^(([0-9]|[0-9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5])\.){3}([0-9]|[0-9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5]):([1-9][0-9]{0,3}|[1-5][0-9]{4}|6[0-4][0-9]{3}|65[0-4][0-9]{2}|655[0-2][0-9]|6553[0-5])$
+ type: string
+ maxItems: 10
+ minItems: 1
+ type: array
+ x-kubernetes-list-type: atomic
+ type: object
+ sFlow:
+ description: sFlow defines the SFlow configuration.
+ properties:
+ collectors:
+ description: sFlowCollectors is list of strings formatted
+ as ip:port with a maximum of ten items
+ items:
+ pattern: ^(([0-9]|[0-9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5])\.){3}([0-9]|[0-9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5]):([1-9][0-9]{0,3}|[1-5][0-9]{4}|6[0-4][0-9]{3}|65[0-4][0-9]{2}|655[0-2][0-9]|6553[0-5])$
+ type: string
+ maxItems: 10
+ minItems: 1
+ type: array
+ x-kubernetes-list-type: atomic
+ type: object
+ type: object
+ kubeProxyConfig:
+ description: |-
+ kubeProxyConfig lets us configure desired proxy configuration, if
+ deployKubeProxy is true. If not specified, sensible defaults will be chosen by
+ OpenShift directly.
+ properties:
+ bindAddress:
+ description: |-
+ The address to "bind" on
+ Defaults to 0.0.0.0
+ type: string
+ iptablesSyncPeriod:
+ description: |-
+ An internal kube-proxy parameter. In older releases of OCP, this sometimes needed to be adjusted
+ in large clusters for performance reasons, but this is no longer necessary, and there is no reason
+ to change this from the default value.
+ Default: 30s
+ type: string
+ proxyArguments:
+ additionalProperties:
+ description: ProxyArgumentList is a list of arguments to pass
+ to the kubeproxy process
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: atomic
+ description: Any additional arguments to pass to the kubeproxy
+ process
+ type: object
+ type: object
+ logLevel:
+ default: Normal
+ description: |-
+ logLevel is an intent based logging for an overall component. It does not give fine grained control, but it is a
+ simple way to manage coarse grained logging choices that operators have to interpret for their operands.
+
+ Valid values are: "Normal", "Debug", "Trace", "TraceAll".
+ Defaults to "Normal".
+ enum:
+ - ""
+ - Normal
+ - Debug
+ - Trace
+ - TraceAll
+ type: string
+ managementState:
+ description: managementState indicates whether and how the operator
+ should manage the component
+ pattern: ^(Managed|Unmanaged|Force|Removed)$
+ type: string
+ migration:
+ description: |-
+ migration enables and configures cluster network migration, for network changes
+ that cannot be made instantly.
+ properties:
+ features:
+ description: |-
+ features was previously used to configure which network plugin features
+ would be migrated in a network type migration.
+ DEPRECATED: network type migration is no longer supported, and setting
+ this to a non-empty value will result in the network operator rejecting
+ the configuration.
+ properties:
+ egressFirewall:
+ default: true
+ description: |-
+ egressFirewall specified whether or not the Egress Firewall configuration was migrated.
+ DEPRECATED: network type migration is no longer supported.
+ type: boolean
+ egressIP:
+ default: true
+ description: |-
+ egressIP specified whether or not the Egress IP configuration was migrated.
+ DEPRECATED: network type migration is no longer supported.
+ type: boolean
+ multicast:
+ default: true
+ description: |-
+ multicast specified whether or not the multicast configuration was migrated.
+ DEPRECATED: network type migration is no longer supported.
+ type: boolean
+ type: object
+ mode:
+ description: |-
+ mode indicates the mode of network type migration.
+ DEPRECATED: network type migration is no longer supported, and setting
+ this to a non-empty value will result in the network operator rejecting
+ the configuration.
+ enum:
+ - Live
+ - Offline
+ - ""
+ type: string
+ mtu:
+ description: |-
+ mtu contains the MTU migration configuration. Set this to allow changing
+ the MTU values for the default network. If unset, the operation of
+ changing the MTU for the default network will be rejected.
+ properties:
+ machine:
+ description: |-
+ machine contains MTU migration configuration for the machine's uplink.
+ Needs to be migrated along with the default network MTU unless the
+ current uplink MTU already accommodates the default network MTU.
+ properties:
+ from:
+ description: from is the MTU to migrate from.
+ format: int32
+ minimum: 0
+ type: integer
+ to:
+ description: to is the MTU to migrate to.
+ format: int32
+ minimum: 0
+ type: integer
+ type: object
+ network:
+ description: |-
+ network contains information about MTU migration for the default network.
+ Migrations are only allowed to MTU values lower than the machine's uplink
+ MTU by the minimum appropriate offset.
+ properties:
+ from:
+ description: from is the MTU to migrate from.
+ format: int32
+ minimum: 0
+ type: integer
+ to:
+ description: to is the MTU to migrate to.
+ format: int32
+ minimum: 0
+ type: integer
+ type: object
+ type: object
+ networkType:
+ description: |-
+ networkType was previously used when changing the default network type.
+ DEPRECATED: network type migration is no longer supported, and setting
+ this to a non-empty value will result in the network operator rejecting
+ the configuration.
+ type: string
+ type: object
+ x-kubernetes-validations:
+ - message: networkType migration in mode other than 'Live' may not
+ be configured at the same time as mtu migration
+ rule: '!has(self.mtu) || !has(self.networkType) || self.networkType
+ == "" || has(self.mode) && self.mode == ''Live'''
+ observedConfig:
+ description: |-
+ observedConfig holds a sparse config that controller has observed from the cluster state. It exists in spec because
+ it is an input to the level for the operator
+ nullable: true
+ type: object
+ x-kubernetes-preserve-unknown-fields: true
+ operatorLogLevel:
+ default: Normal
+ description: |-
+ operatorLogLevel is an intent based logging for the operator itself. It does not give fine grained control, but it is a
+ simple way to manage coarse grained logging choices that operators have to interpret for themselves.
+
+ Valid values are: "Normal", "Debug", "Trace", "TraceAll".
+ Defaults to "Normal".
+ enum:
+ - ""
+ - Normal
+ - Debug
+ - Trace
+ - TraceAll
+ type: string
+ serviceNetwork:
+ description: |-
+ serviceNetwork is the ip address pool to use for Service IPs
+ Currently, all existing network providers only support a single value
+ here, but this is an array to allow for growth.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: atomic
+ unsupportedConfigOverrides:
+ description: |-
+ unsupportedConfigOverrides overrides the final configuration that was computed by the operator.
+ Red Hat does not support the use of this field.
+ Misuse of this field could lead to unexpected behavior or conflict with other configuration options.
+ Seek guidance from the Red Hat support before using this field.
+ Use of this property blocks cluster upgrades, it must be removed before upgrading your cluster.
+ nullable: true
+ type: object
+ x-kubernetes-preserve-unknown-fields: true
+ useMultiNetworkPolicy:
+ description: |-
+ useMultiNetworkPolicy enables a controller which allows for
+ MultiNetworkPolicy objects to be used on additional networks as
+ created by Multus CNI. MultiNetworkPolicy are similar to NetworkPolicy
+ objects, but NetworkPolicy objects only apply to the primary interface.
+ With MultiNetworkPolicy, you can control the traffic that a pod can receive
+ over the secondary interfaces. If unset, this property defaults to 'false'
+ and MultiNetworkPolicy objects are ignored. If 'disableMultiNetwork' is
+ 'true' then the value of this field is ignored.
+ type: boolean
+ type: object
+ x-kubernetes-validations:
+ - message: Route advertisements cannot be Enabled if 'FRR' routing capability
+ provider is not available
+ rule: (has(self.additionalRoutingCapabilities) && ('FRR' in self.additionalRoutingCapabilities.providers))
+ || !has(self.defaultNetwork) || !has(self.defaultNetwork.ovnKubernetesConfig)
+ || !has(self.defaultNetwork.ovnKubernetesConfig.routeAdvertisements)
+ || self.defaultNetwork.ovnKubernetesConfig.routeAdvertisements !=
+ 'Enabled'
+ - message: invalid value for IPForwarding, valid values are 'Restricted'
+ or 'Global'
+ rule: '!has(self.defaultNetwork) || !has(self.defaultNetwork.ovnKubernetesConfig)
+ || !has(self.defaultNetwork.ovnKubernetesConfig.gatewayConfig) ||
+ !has(self.defaultNetwork.ovnKubernetesConfig.gatewayConfig.ipForwarding)
+ || self.defaultNetwork.ovnKubernetesConfig.gatewayConfig.ipForwarding
+ == oldSelf.defaultNetwork.ovnKubernetesConfig.gatewayConfig.ipForwarding
+ || self.defaultNetwork.ovnKubernetesConfig.gatewayConfig.ipForwarding
+ == ''Restricted'' || self.defaultNetwork.ovnKubernetesConfig.gatewayConfig.ipForwarding
+ == ''Global'''
+ status:
+ description: |-
+ NetworkStatus is detailed operator status, which is distilled
+ up to the Network clusteroperator object.
+ properties:
+ conditions:
+ description: conditions is a list of conditions and their status
+ items:
+ description: OperatorCondition is just the standard condition fields.
+ properties:
+ lastTransitionTime:
+ description: |-
+ lastTransitionTime is the last time the condition transitioned from one status to another.
+ This should be when the underlying condition changed. If that is not known, then using the time when the API field changed is acceptable.
+ format: date-time
+ type: string
+ message:
+ type: string
+ reason:
+ type: string
+ status:
+ description: status of the condition, one of True, False, Unknown.
+ enum:
+ - "True"
+ - "False"
+ - Unknown
+ type: string
+ type:
+ description: type of condition in CamelCase or in foo.example.com/CamelCase.
+ maxLength: 316
+ pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$
+ type: string
+ required:
+ - lastTransitionTime
+ - status
+ - type
+ type: object
+ type: array
+ x-kubernetes-list-map-keys:
+ - type
+ x-kubernetes-list-type: map
+ generations:
+ description: generations are used to determine when an item needs
+ to be reconciled or has changed in a way that needs a reaction.
+ items:
+ description: GenerationStatus keeps track of the generation for
+ a given resource so that decisions about forced updates can be
+ made.
+ properties:
+ group:
+ description: group is the group of the thing you're tracking
+ type: string
+ hash:
+ description: hash is an optional field set for resources without
+ generation that are content sensitive like secrets and configmaps
+ type: string
+ lastGeneration:
+ description: lastGeneration is the last generation of the workload
+ controller involved
+ format: int64
+ type: integer
+ name:
+ description: name is the name of the thing you're tracking
+ type: string
+ namespace:
+ description: namespace is where the thing you're tracking is
+ type: string
+ resource:
+ description: resource is the resource type of the thing you're
+ tracking
+ type: string
+ required:
+ - group
+ - name
+ - namespace
+ - resource
+ type: object
+ type: array
+ x-kubernetes-list-map-keys:
+ - group
+ - resource
+ - namespace
+ - name
+ x-kubernetes-list-type: map
+ latestAvailableRevision:
+ description: latestAvailableRevision is the deploymentID of the most
+ recent deployment
+ format: int32
+ type: integer
+ x-kubernetes-validations:
+ - message: must only increase
+ rule: self >= oldSelf
+ observedGeneration:
+ description: observedGeneration is the last generation change you've
+ dealt with
+ format: int64
+ type: integer
+ readyReplicas:
+ description: readyReplicas indicates how many replicas are ready and
+ at the desired state
+ format: int32
+ type: integer
+ version:
+ description: version is the level this availability applies to
+ type: string
+ type: object
+ type: object
+ served: true
+ storage: true
+ subresources:
+ status: {}
diff --git a/operator/v1/zz_generated.deepcopy.go b/operator/v1/zz_generated.deepcopy.go
index fd83694c23f..9938c7ed995 100644
--- a/operator/v1/zz_generated.deepcopy.go
+++ b/operator/v1/zz_generated.deepcopy.go
@@ -390,6 +390,22 @@ func (in *AzureDiskEncryptionSet) DeepCopy() *AzureDiskEncryptionSet {
return out
}
+// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
+func (in *BGPManagedConfig) DeepCopyInto(out *BGPManagedConfig) {
+ *out = *in
+ return
+}
+
+// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new BGPManagedConfig.
+func (in *BGPManagedConfig) DeepCopy() *BGPManagedConfig {
+ if in == nil {
+ return nil
+ }
+ out := new(BGPManagedConfig)
+ in.DeepCopyInto(out)
+ return out
+}
+
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
func (in *BootImageSkewEnforcementConfig) DeepCopyInto(out *BootImageSkewEnforcementConfig) {
*out = *in
@@ -3660,6 +3676,22 @@ func (in *NetworkStatus) DeepCopy() *NetworkStatus {
return out
}
+// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
+func (in *NoOverlayOptions) DeepCopyInto(out *NoOverlayOptions) {
+ *out = *in
+ return
+}
+
+// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new NoOverlayOptions.
+func (in *NoOverlayOptions) DeepCopy() *NoOverlayOptions {
+ if in == nil {
+ return nil
+ }
+ out := new(NoOverlayOptions)
+ in.DeepCopyInto(out)
+ return out
+}
+
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
func (in *NodeDisruptionPolicyClusterStatus) DeepCopyInto(out *NodeDisruptionPolicyClusterStatus) {
*out = *in
@@ -4153,6 +4185,16 @@ func (in *OVNKubernetesConfig) DeepCopyInto(out *OVNKubernetesConfig) {
*out = new(IPv6OVNKubernetesConfig)
**out = **in
}
+ if in.DefaultNetworkNoOverlayOptions != nil {
+ in, out := &in.DefaultNetworkNoOverlayOptions, &out.DefaultNetworkNoOverlayOptions
+ *out = new(NoOverlayOptions)
+ **out = **in
+ }
+ if in.BGPManagedConfig != nil {
+ in, out := &in.BGPManagedConfig, &out.BGPManagedConfig
+ *out = new(BGPManagedConfig)
+ **out = **in
+ }
return
}
diff --git a/operator/v1/zz_generated.featuregated-crd-manifests.yaml b/operator/v1/zz_generated.featuregated-crd-manifests.yaml
index e7c94e28694..c35554548a6 100644
--- a/operator/v1/zz_generated.featuregated-crd-manifests.yaml
+++ b/operator/v1/zz_generated.featuregated-crd-manifests.yaml
@@ -330,6 +330,7 @@ networks.operator.openshift.io:
FeatureGates:
- AdditionalRoutingCapabilities
- NetworkLiveMigration
+ - NoOverlayMode
- RouteAdvertisements
FilenameOperatorName: network
FilenameOperatorOrdering: "01"
diff --git a/operator/v1/zz_generated.featuregated-crd-manifests/networks.operator.openshift.io/AAA_ungated.yaml b/operator/v1/zz_generated.featuregated-crd-manifests/networks.operator.openshift.io/AAA_ungated.yaml
index 2f5039afaeb..f8ba0ff0fa4 100644
--- a/operator/v1/zz_generated.featuregated-crd-manifests/networks.operator.openshift.io/AAA_ungated.yaml
+++ b/operator/v1/zz_generated.featuregated-crd-manifests/networks.operator.openshift.io/AAA_ungated.yaml
@@ -586,6 +586,21 @@ spec:
Default is fd98::/64
type: string
type: object
+ x-kubernetes-validations:
+ - message: defaultNetworkNoOverlayOptions is only supported for
+ no-overlay networks
+ rule: '''self.defaultNetworkTransport == "NoOverlay" || !has(self.defaultNetworkNoOverlayOptions)'''
+ - message: bgpManagedConfig is required when DefaultNetworkTransport
+ is NoOverlay, DefaultNetworkNoOverlayOptions is set and DefaultNetworkNoOverlayOptions.Routing="Managed"
+ rule: '''!(self.defaultNetworkTransport == "NoOverlay" && has(self.defaultNetworkNoOverlayOptions)
+ && self.defaultNetworkNoOverlayOptions.routing == "Managed")
+ || has(self.bgpManagedConfig)'''
+ - message: DefaultNetworkTransport field is immutable
+ rule: '''self.defaultNetworkTransport == oldSelf.defaultNetworkTransport'''
+ - message: defaultNetworkNoOverlayOptions field is immutable
+ rule: '''self.defaultNetworkNoOverlayOptions == oldSelf.defaultNetworkNoOverlayOptions'''
+ - message: bgpManagedConfig field is immutable
+ rule: '''self.bgpManagedConfig == oldSelf.bgpManagedConfig'''
type:
description: |-
type is the type of network
diff --git a/operator/v1/zz_generated.featuregated-crd-manifests/networks.operator.openshift.io/AdditionalRoutingCapabilities.yaml b/operator/v1/zz_generated.featuregated-crd-manifests/networks.operator.openshift.io/AdditionalRoutingCapabilities.yaml
index 928fbb797d8..a9dd31c9491 100644
--- a/operator/v1/zz_generated.featuregated-crd-manifests/networks.operator.openshift.io/AdditionalRoutingCapabilities.yaml
+++ b/operator/v1/zz_generated.featuregated-crd-manifests/networks.operator.openshift.io/AdditionalRoutingCapabilities.yaml
@@ -619,6 +619,21 @@ spec:
Default is fd98::/64
type: string
type: object
+ x-kubernetes-validations:
+ - message: defaultNetworkNoOverlayOptions is only supported for
+ no-overlay networks
+ rule: '''self.defaultNetworkTransport == "NoOverlay" || !has(self.defaultNetworkNoOverlayOptions)'''
+ - message: bgpManagedConfig is required when DefaultNetworkTransport
+ is NoOverlay, DefaultNetworkNoOverlayOptions is set and DefaultNetworkNoOverlayOptions.Routing="Managed"
+ rule: '''!(self.defaultNetworkTransport == "NoOverlay" && has(self.defaultNetworkNoOverlayOptions)
+ && self.defaultNetworkNoOverlayOptions.routing == "Managed")
+ || has(self.bgpManagedConfig)'''
+ - message: DefaultNetworkTransport field is immutable
+ rule: '''self.defaultNetworkTransport == oldSelf.defaultNetworkTransport'''
+ - message: defaultNetworkNoOverlayOptions field is immutable
+ rule: '''self.defaultNetworkNoOverlayOptions == oldSelf.defaultNetworkNoOverlayOptions'''
+ - message: bgpManagedConfig field is immutable
+ rule: '''self.bgpManagedConfig == oldSelf.bgpManagedConfig'''
type:
description: |-
type is the type of network
diff --git a/operator/v1/zz_generated.featuregated-crd-manifests/networks.operator.openshift.io/NetworkLiveMigration.yaml b/operator/v1/zz_generated.featuregated-crd-manifests/networks.operator.openshift.io/NetworkLiveMigration.yaml
index f2f2b59ac4c..e76925f788f 100644
--- a/operator/v1/zz_generated.featuregated-crd-manifests/networks.operator.openshift.io/NetworkLiveMigration.yaml
+++ b/operator/v1/zz_generated.featuregated-crd-manifests/networks.operator.openshift.io/NetworkLiveMigration.yaml
@@ -586,6 +586,21 @@ spec:
Default is fd98::/64
type: string
type: object
+ x-kubernetes-validations:
+ - message: defaultNetworkNoOverlayOptions is only supported for
+ no-overlay networks
+ rule: '''self.defaultNetworkTransport == "NoOverlay" || !has(self.defaultNetworkNoOverlayOptions)'''
+ - message: bgpManagedConfig is required when DefaultNetworkTransport
+ is NoOverlay, DefaultNetworkNoOverlayOptions is set and DefaultNetworkNoOverlayOptions.Routing="Managed"
+ rule: '''!(self.defaultNetworkTransport == "NoOverlay" && has(self.defaultNetworkNoOverlayOptions)
+ && self.defaultNetworkNoOverlayOptions.routing == "Managed")
+ || has(self.bgpManagedConfig)'''
+ - message: DefaultNetworkTransport field is immutable
+ rule: '''self.defaultNetworkTransport == oldSelf.defaultNetworkTransport'''
+ - message: defaultNetworkNoOverlayOptions field is immutable
+ rule: '''self.defaultNetworkNoOverlayOptions == oldSelf.defaultNetworkNoOverlayOptions'''
+ - message: bgpManagedConfig field is immutable
+ rule: '''self.bgpManagedConfig == oldSelf.bgpManagedConfig'''
type:
description: |-
type is the type of network
diff --git a/operator/v1/zz_generated.featuregated-crd-manifests/networks.operator.openshift.io/NoOverlayMode.yaml b/operator/v1/zz_generated.featuregated-crd-manifests/networks.operator.openshift.io/NoOverlayMode.yaml
new file mode 100644
index 00000000000..2ab4408a381
--- /dev/null
+++ b/operator/v1/zz_generated.featuregated-crd-manifests/networks.operator.openshift.io/NoOverlayMode.yaml
@@ -0,0 +1,1075 @@
+apiVersion: apiextensions.k8s.io/v1
+kind: CustomResourceDefinition
+metadata:
+ annotations:
+ api-approved.openshift.io: https://github.com/openshift/api/pull/475
+ api.openshift.io/filename-cvo-runlevel: "0000_70"
+ api.openshift.io/filename-operator: network
+ api.openshift.io/filename-ordering: "01"
+ feature-gate.release.openshift.io/NoOverlayMode: "true"
+ name: networks.operator.openshift.io
+spec:
+ group: operator.openshift.io
+ names:
+ kind: Network
+ listKind: NetworkList
+ plural: networks
+ singular: network
+ scope: Cluster
+ versions:
+ - name: v1
+ schema:
+ openAPIV3Schema:
+ description: |-
+ Network describes the cluster's desired network configuration. It is
+ consumed by the cluster-network-operator.
+
+ Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
+ properties:
+ apiVersion:
+ description: |-
+ APIVersion defines the versioned schema of this representation of an object.
+ Servers should convert recognized schemas to the latest internal value, and
+ may reject unrecognized values.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
+ type: string
+ kind:
+ description: |-
+ Kind is a string value representing the REST resource this object represents.
+ Servers may infer this from the endpoint the client submits requests to.
+ Cannot be updated.
+ In CamelCase.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
+ type: string
+ metadata:
+ type: object
+ spec:
+ description: NetworkSpec is the top-level network configuration object.
+ properties:
+ additionalNetworks:
+ description: |-
+ additionalNetworks is a list of extra networks to make available to pods
+ when multiple networks are enabled.
+ items:
+ description: |-
+ AdditionalNetworkDefinition configures an extra network that is available but not
+ created by default. Instead, pods must request them by name.
+ type must be specified, along with exactly one "Config" that matches the type.
+ properties:
+ name:
+ description: |-
+ name is the name of the network. This will be populated in the resulting CRD
+ This must be unique.
+ type: string
+ namespace:
+ description: |-
+ namespace is the namespace of the network. This will be populated in the resulting CRD
+ If not given the network will be created in the default namespace.
+ type: string
+ rawCNIConfig:
+ description: |-
+ rawCNIConfig is the raw CNI configuration json to create in the
+ NetworkAttachmentDefinition CRD
+ type: string
+ simpleMacvlanConfig:
+ description: simpleMacvlanConfig configures the macvlan interface
+ in case of type:NetworkTypeSimpleMacvlan
+ properties:
+ ipamConfig:
+ description: ipamConfig configures IPAM module will be used
+ for IP Address Management (IPAM).
+ properties:
+ staticIPAMConfig:
+ description: staticIPAMConfig configures the static
+ IP address in case of type:IPAMTypeStatic
+ properties:
+ addresses:
+ description: addresses configures IP address for
+ the interface
+ items:
+ description: StaticIPAMAddresses provides IP address
+ and Gateway for static IPAM addresses
+ properties:
+ address:
+ description: address is the IP address in
+ CIDR format
+ type: string
+ gateway:
+ description: gateway is IP inside of subnet
+ to designate as the gateway
+ type: string
+ type: object
+ type: array
+ x-kubernetes-list-type: atomic
+ dns:
+ description: dns configures DNS for the interface
+ properties:
+ domain:
+ description: domain configures the domainname
+ the local domain used for short hostname lookups
+ type: string
+ nameservers:
+ description: nameservers points DNS servers
+ for IP lookup
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: atomic
+ search:
+ description: search configures priority ordered
+ search domains for short hostname lookups
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: atomic
+ type: object
+ routes:
+ description: routes configures IP routes for the
+ interface
+ items:
+ description: StaticIPAMRoutes provides Destination/Gateway
+ pairs for static IPAM routes
+ properties:
+ destination:
+ description: destination points the IP route
+ destination
+ type: string
+ gateway:
+ description: |-
+ gateway is the route's next-hop IP address
+ If unset, a default gateway is assumed (as determined by the CNI plugin).
+ type: string
+ type: object
+ type: array
+ x-kubernetes-list-type: atomic
+ type: object
+ type:
+ description: |-
+ type is the type of IPAM module will be used for IP Address Management(IPAM).
+ The supported values are IPAMTypeDHCP, IPAMTypeStatic
+ type: string
+ type: object
+ master:
+ description: |-
+ master is the host interface to create the macvlan interface from.
+ If not specified, it will be default route interface
+ type: string
+ mode:
+ description: 'mode is the macvlan mode: bridge, private,
+ vepa, passthru. The default is bridge'
+ type: string
+ mtu:
+ description: |-
+ mtu is the mtu to use for the macvlan interface. if unset, host's
+ kernel will select the value.
+ format: int32
+ minimum: 0
+ type: integer
+ type: object
+ type:
+ description: |-
+ type is the type of network
+ The supported values are NetworkTypeRaw, NetworkTypeSimpleMacvlan
+ type: string
+ required:
+ - name
+ type: object
+ type: array
+ x-kubernetes-list-map-keys:
+ - name
+ x-kubernetes-list-type: map
+ clusterNetwork:
+ description: |-
+ clusterNetwork is the IP address pool to use for pod IPs.
+ Some network providers support multiple ClusterNetworks.
+ Others only support one. This is equivalent to the cluster-cidr.
+ items:
+ description: |-
+ ClusterNetworkEntry is a subnet from which to allocate PodIPs. A network of size
+ HostPrefix (in CIDR notation) will be allocated when nodes join the cluster. If
+ the HostPrefix field is not used by the plugin, it can be left unset.
+ Not all network providers support multiple ClusterNetworks
+ properties:
+ cidr:
+ type: string
+ hostPrefix:
+ format: int32
+ minimum: 0
+ type: integer
+ type: object
+ type: array
+ x-kubernetes-list-type: atomic
+ defaultNetwork:
+ description: defaultNetwork is the "default" network that all pods
+ will receive
+ properties:
+ openshiftSDNConfig:
+ description: |-
+ openshiftSDNConfig was previously used to configure the openshift-sdn plugin.
+ DEPRECATED: OpenShift SDN is no longer supported.
+ properties:
+ enableUnidling:
+ description: |-
+ enableUnidling controls whether or not the service proxy will support idling
+ and unidling of services. By default, unidling is enabled.
+ type: boolean
+ mode:
+ description: mode is one of "Multitenant", "Subnet", or "NetworkPolicy"
+ type: string
+ mtu:
+ description: |-
+ mtu is the mtu to use for the tunnel interface. Defaults to 1450 if unset.
+ This must be 50 bytes smaller than the machine's uplink.
+ format: int32
+ minimum: 0
+ type: integer
+ useExternalOpenvswitch:
+ description: |-
+ useExternalOpenvswitch used to control whether the operator would deploy an OVS
+ DaemonSet itself or expect someone else to start OVS. As of 4.6, OVS is always
+ run as a system service, and this flag is ignored.
+ type: boolean
+ vxlanPort:
+ description: vxlanPort is the port to use for all vxlan packets.
+ The default is 4789.
+ format: int32
+ minimum: 0
+ type: integer
+ type: object
+ ovnKubernetesConfig:
+ description: ovnKubernetesConfig configures the ovn-kubernetes
+ plugin.
+ properties:
+ bgpManagedConfig:
+ description: |-
+ bgpManagedConfig configures the BGP properties for networks (default network or CUDNs)
+ in no-overlay mode that specify routing="Managed" in their NoOverlayOptions.
+ It is required when DefaultNetworkNoOverlayOptions.Routing is set to "Managed".
+ When omitted, this means the user does not configure BGP for managed routing.
+ properties:
+ asNumber:
+ description: |-
+ asNumber is the 2-byte or 4-byte Autonomous System Number (ASN)
+ to be used in the generated FRR configuration. It is required
+ when NoOverlayOptions.Routing is "Managed".
+ Valid values are 1 to 4294967295.
+ format: int32
+ maximum: 4294967295
+ minimum: 1
+ type: integer
+ bgpTopology:
+ default: fullMesh
+ description: |-
+ bgpTopology defines the BGP topology to be used.
+ Allowed values are "fullMesh".
+ When set to "fullMesh", every node deploys a BGP router, forming a BGP full mesh.
+ When omitted, this means the user has no opinion and the platform chooses a reasonable default which is subject to change over time.
+ The current default is "fullMesh".
+ enum:
+ - fullMesh
+ type: string
+ required:
+ - asNumber
+ type: object
+ defaultNetworkNoOverlayOptions:
+ description: |-
+ defaultNetworkNoOverlayOptions contains configuration for no-overlay mode for the default network.
+ It is required when DefaultNetworkTransport is "NoOverlay".
+ When omitted, this means the user does not configure no-overlay mode options.
+ properties:
+ outboundSNAT:
+ description: |-
+ outboundSNAT defines the SNAT behavior for outbound traffic from pods.
+ Allowed values are "Enable" and "Disable".
+ When set to "Enable", SNAT is performed on outbound traffic from pods.
+ When set to "Disable", SNAT is not performed and pod IPs are preserved in outbound traffic.
+ This field is required when the network operates in no-overlay mode.
+ enum:
+ - Enable
+ - Disable
+ type: string
+ routing:
+ description: |-
+ routing specifies whether the pod network routing is managed by OVN-Kubernetes or users.
+ Allowed values are "Managed" and "Unmanaged".
+ When set to "Managed", OVN-Kubernetes manages the pod network routing configuration through BGP.
+ When set to "Unmanaged", users are responsible for configuring the pod network routing.
+ This field is required when the network operates in no-overlay mode.
+ enum:
+ - Managed
+ - Unmanaged
+ type: string
+ required:
+ - outboundSNAT
+ - routing
+ type: object
+ defaultNetworkTransport:
+ default: Geneve
+ description: |-
+ defaultNetworkTransport describes the transport protocol for east-west traffic for the default network.
+ Allowed values are "NoOverlay" and "Geneve".
+ When set to "NoOverlay", the default network operates in no-overlay mode.
+ When set to "Geneve", the default network uses Geneve overlay.
+ When omitted, this means the user has no opinion and the platform chooses a reasonable default which is subject to change over time.
+ The current default is "Geneve".
+ enum:
+ - NoOverlay
+ - Geneve
+ type: string
+ egressIPConfig:
+ description: egressIPConfig holds the configuration for EgressIP
+ options.
+ properties:
+ reachabilityTotalTimeoutSeconds:
+ description: |-
+ reachabilityTotalTimeout configures the EgressIP node reachability check total timeout in seconds.
+ If the EgressIP node cannot be reached within this timeout, the node is declared down.
+ Setting a large value may cause the EgressIP feature to react slowly to node changes.
+ In particular, it may react slowly for EgressIP nodes that really have a genuine problem and are unreachable.
+ When omitted, this means the user has no opinion and the platform is left to choose a reasonable default, which is subject to change over time.
+ The current default is 1 second.
+ A value of 0 disables the EgressIP node's reachability check.
+ format: int32
+ maximum: 60
+ minimum: 0
+ type: integer
+ type: object
+ gatewayConfig:
+ description: gatewayConfig holds the configuration for node
+ gateway options.
+ properties:
+ ipForwarding:
+ description: |-
+ ipForwarding controls IP forwarding for all traffic on OVN-Kubernetes managed interfaces (such as br-ex).
+ By default this is set to Restricted, and Kubernetes related traffic is still forwarded appropriately, but other
+ IP traffic will not be routed by the OCP node. If there is a desire to allow the host to forward traffic across
+ OVN-Kubernetes managed interfaces, then set this field to "Global".
+ The supported values are "Restricted" and "Global".
+ type: string
+ ipv4:
+ description: |-
+ ipv4 allows users to configure IP settings for IPv4 connections. When omitted, this means no opinion and the default
+ configuration is used. Check individual members fields within ipv4 for details of default values.
+ properties:
+ internalMasqueradeSubnet:
+ description: |-
+ internalMasqueradeSubnet contains the masquerade addresses in IPV4 CIDR format used internally by
+ ovn-kubernetes to enable host to service traffic. Each host in the cluster is configured with these
+ addresses, as well as the shared gateway bridge interface. The values can be changed after
+ installation. The subnet chosen should not overlap with other networks specified for
+ OVN-Kubernetes as well as other networks used on the host. Additionally the subnet must
+ be large enough to accommodate 6 IPs (maximum prefix length /29).
+ When omitted, this means no opinion and the platform is left to choose a reasonable default which is subject to change over time.
+ The current default subnet is 169.254.0.0/17
+ The value must be in proper IPV4 CIDR format
+ maxLength: 18
+ type: string
+ x-kubernetes-validations:
+ - message: Subnet must be in valid IPV4 CIDR format
+ rule: isCIDR(self) && cidr(self).ip().family() ==
+ 4
+ - message: subnet must be in the range /0 to /29 inclusive
+ rule: isCIDR(self) && cidr(self).prefixLength()
+ <= 29
+ - message: first IP address octet must not be 0
+ rule: isCIDR(self) && int(self.split('.')[0]) >
+ 0
+ type: object
+ ipv6:
+ description: |-
+ ipv6 allows users to configure IP settings for IPv6 connections. When omitted, this means no opinion and the default
+ configuration is used. Check individual members fields within ipv6 for details of default values.
+ properties:
+ internalMasqueradeSubnet:
+ description: |-
+ internalMasqueradeSubnet contains the masquerade addresses in IPV6 CIDR format used internally by
+ ovn-kubernetes to enable host to service traffic. Each host in the cluster is configured with these
+ addresses, as well as the shared gateway bridge interface. The values can be changed after
+ installation. The subnet chosen should not overlap with other networks specified for
+ OVN-Kubernetes as well as other networks used on the host. Additionally the subnet must
+ be large enough to accommodate 6 IPs (maximum prefix length /125).
+ When omitted, this means no opinion and the platform is left to choose a reasonable default which is subject to change over time.
+ The current default subnet is fd69::/112
+ Note that IPV6 dual addresses are not permitted
+ type: string
+ x-kubernetes-validations:
+ - message: Subnet must be in valid IPV6 CIDR format
+ rule: isCIDR(self) && cidr(self).ip().family() ==
+ 6
+ - message: subnet must be in the range /0 to /125
+ inclusive
+ rule: isCIDR(self) && cidr(self).prefixLength()
+ <= 125
+ type: object
+ routingViaHost:
+ default: false
+ description: |-
+ routingViaHost allows pod egress traffic to exit via the ovn-k8s-mp0 management port
+ into the host before sending it out. If this is not set, traffic will always egress directly
+ from OVN to outside without touching the host stack. Setting this to true means hardware
+ offload will not be supported. Default is false if GatewayConfig is specified.
+ type: boolean
+ type: object
+ genevePort:
+ description: |-
+ geneve port is the UDP port to be used by geneve encapulation.
+ Default is 6081
+ format: int32
+ minimum: 1
+ type: integer
+ hybridOverlayConfig:
+ description: |-
+ hybridOverlayConfig configures an additional overlay network for peers that are
+ not using OVN.
+ properties:
+ hybridClusterNetwork:
+ description: hybridClusterNetwork defines a network space
+ given to nodes on an additional overlay network.
+ items:
+ description: |-
+ ClusterNetworkEntry is a subnet from which to allocate PodIPs. A network of size
+ HostPrefix (in CIDR notation) will be allocated when nodes join the cluster. If
+ the HostPrefix field is not used by the plugin, it can be left unset.
+ Not all network providers support multiple ClusterNetworks
+ properties:
+ cidr:
+ type: string
+ hostPrefix:
+ format: int32
+ minimum: 0
+ type: integer
+ type: object
+ type: array
+ x-kubernetes-list-type: atomic
+ hybridOverlayVXLANPort:
+ description: |-
+ hybridOverlayVXLANPort defines the VXLAN port number to be used by the additional overlay network.
+ Default is 4789
+ format: int32
+ type: integer
+ type: object
+ ipsecConfig:
+ default:
+ mode: Disabled
+ description: |-
+ ipsecConfig enables and configures IPsec for pods on the pod network within the
+ cluster.
+ properties:
+ full:
+ description: |-
+ full defines configuration parameters for the IPsec `Full` mode.
+ This is permitted only when mode is configured with `Full`,
+ and forbidden otherwise.
+ minProperties: 1
+ properties:
+ encapsulation:
+ description: |-
+ encapsulation option to configure libreswan on how inter-pod traffic across nodes
+ are encapsulated to handle NAT traversal. When configured it uses UDP port 4500
+ for the encapsulation.
+ Valid values are Always, Auto and omitted.
+ Always means enable UDP encapsulation regardless of whether NAT is detected.
+ Auto means enable UDP encapsulation based on the detection of NAT.
+ When omitted, this means no opinion and the platform is left to choose a reasonable
+ default, which is subject to change over time. The current default is Auto.
+ enum:
+ - Always
+ - Auto
+ type: string
+ type: object
+ mode:
+ description: |-
+ mode defines the behaviour of the ipsec configuration within the platform.
+ Valid values are `Disabled`, `External` and `Full`.
+ When 'Disabled', ipsec will not be enabled at the node level.
+ When 'External', ipsec is enabled on the node level but requires the user to configure the secure communication parameters.
+ This mode is for external secure communications and the configuration can be done using the k8s-nmstate operator.
+ When 'Full', ipsec is configured on the node level and inter-pod secure communication within the cluster is configured.
+ Note with `Full`, if ipsec is desired for communication with external (to the cluster) entities (such as storage arrays),
+ this is left to the user to configure.
+ enum:
+ - Disabled
+ - External
+ - Full
+ type: string
+ type: object
+ x-kubernetes-validations:
+ - message: ipsecConfig.mode is required
+ rule: self == oldSelf || has(self.mode)
+ - message: full is forbidden when mode is not Full
+ rule: 'has(self.mode) && self.mode == ''Full'' ? true :
+ !has(self.full)'
+ ipv4:
+ description: |-
+ ipv4 allows users to configure IP settings for IPv4 connections. When ommitted,
+ this means no opinions and the default configuration is used. Check individual
+ fields within ipv4 for details of default values.
+ properties:
+ internalJoinSubnet:
+ description: |-
+ internalJoinSubnet is a v4 subnet used internally by ovn-kubernetes in case the
+ default one is being already used by something else. It must not overlap with
+ any other subnet being used by OpenShift or by the node network. The size of the
+ subnet must be larger than the number of nodes.
+ The current default value is 100.64.0.0/16
+ The subnet must be large enough to accommodate one IP per node in your cluster
+ The value must be in proper IPV4 CIDR format
+ maxLength: 18
+ type: string
+ x-kubernetes-validations:
+ - message: Subnet must be in valid IPV4 CIDR format
+ rule: isCIDR(self) && cidr(self).ip().family() == 4
+ - message: subnet must be in the range /0 to /30 inclusive
+ rule: isCIDR(self) && cidr(self).prefixLength() <= 30
+ - message: first IP address octet must not be 0
+ rule: isCIDR(self) && int(self.split('.')[0]) > 0
+ internalTransitSwitchSubnet:
+ description: |-
+ internalTransitSwitchSubnet is a v4 subnet in IPV4 CIDR format used internally
+ by OVN-Kubernetes for the distributed transit switch in the OVN Interconnect
+ architecture that connects the cluster routers on each node together to enable
+ east west traffic. The subnet chosen should not overlap with other networks
+ specified for OVN-Kubernetes as well as other networks used on the host.
+ When ommitted, this means no opinion and the platform is left to choose a reasonable
+ default which is subject to change over time.
+ The current default subnet is 100.88.0.0/16
+ The subnet must be large enough to accommodate one IP per node in your cluster
+ The value must be in proper IPV4 CIDR format
+ maxLength: 18
+ type: string
+ x-kubernetes-validations:
+ - message: Subnet must be in valid IPV4 CIDR format
+ rule: isCIDR(self) && cidr(self).ip().family() == 4
+ - message: subnet must be in the range /0 to /30 inclusive
+ rule: isCIDR(self) && cidr(self).prefixLength() <= 30
+ - message: first IP address octet must not be 0
+ rule: isCIDR(self) && int(self.split('.')[0]) > 0
+ type: object
+ ipv6:
+ description: |-
+ ipv6 allows users to configure IP settings for IPv6 connections. When ommitted,
+ this means no opinions and the default configuration is used. Check individual
+ fields within ipv4 for details of default values.
+ properties:
+ internalJoinSubnet:
+ description: |-
+ internalJoinSubnet is a v6 subnet used internally by ovn-kubernetes in case the
+ default one is being already used by something else. It must not overlap with
+ any other subnet being used by OpenShift or by the node network. The size of the
+ subnet must be larger than the number of nodes.
+ The subnet must be large enough to accommodate one IP per node in your cluster
+ The current default value is fd98::/64
+ The value must be in proper IPV6 CIDR format
+ Note that IPV6 dual addresses are not permitted
+ maxLength: 48
+ type: string
+ x-kubernetes-validations:
+ - message: Subnet must be in valid IPV6 CIDR format
+ rule: isCIDR(self) && cidr(self).ip().family() == 6
+ - message: subnet must be in the range /0 to /125 inclusive
+ rule: isCIDR(self) && cidr(self).prefixLength() <= 125
+ internalTransitSwitchSubnet:
+ description: |-
+ internalTransitSwitchSubnet is a v4 subnet in IPV4 CIDR format used internally
+ by OVN-Kubernetes for the distributed transit switch in the OVN Interconnect
+ architecture that connects the cluster routers on each node together to enable
+ east west traffic. The subnet chosen should not overlap with other networks
+ specified for OVN-Kubernetes as well as other networks used on the host.
+ When ommitted, this means no opinion and the platform is left to choose a reasonable
+ default which is subject to change over time.
+ The subnet must be large enough to accommodate one IP per node in your cluster
+ The current default subnet is fd97::/64
+ The value must be in proper IPV6 CIDR format
+ Note that IPV6 dual addresses are not permitted
+ maxLength: 48
+ type: string
+ x-kubernetes-validations:
+ - message: Subnet must be in valid IPV6 CIDR format
+ rule: isCIDR(self) && cidr(self).ip().family() == 6
+ - message: subnet must be in the range /0 to /125 inclusive
+ rule: isCIDR(self) && cidr(self).prefixLength() <= 125
+ type: object
+ mtu:
+ description: |-
+ mtu is the MTU to use for the tunnel interface. This must be 100
+ bytes smaller than the uplink mtu.
+ Default is 1400
+ format: int32
+ minimum: 0
+ type: integer
+ policyAuditConfig:
+ description: |-
+ policyAuditConfig is the configuration for network policy audit events. If unset,
+ reported defaults are used.
+ properties:
+ destination:
+ default: "null"
+ description: |-
+ destination is the location for policy log messages.
+ Regardless of this config, persistent logs will always be dumped to the host
+ at /var/log/ovn/ however
+ Additionally syslog output may be configured as follows.
+ Valid values are:
+ - "libc" -> to use the libc syslog() function of the host node's journdald process
+ - "udp:host:port" -> for sending syslog over UDP
+ - "unix:file" -> for using the UNIX domain socket directly
+ - "null" -> to discard all messages logged to syslog
+ The default is "null"
+ type: string
+ maxFileSize:
+ default: 50
+ description: |-
+ maxFilesSize is the max size an ACL_audit log file is allowed to reach before rotation occurs
+ Units are in MB and the Default is 50MB
+ format: int32
+ minimum: 1
+ type: integer
+ maxLogFiles:
+ default: 5
+ description: maxLogFiles specifies the maximum number
+ of ACL_audit log files that can be present.
+ format: int32
+ minimum: 1
+ type: integer
+ rateLimit:
+ default: 20
+ description: |-
+ rateLimit is the approximate maximum number of messages to generate per-second per-node. If
+ unset the default of 20 msg/sec is used.
+ format: int32
+ minimum: 1
+ type: integer
+ syslogFacility:
+ default: local0
+ description: syslogFacility the RFC5424 facility for generated
+ messages, e.g. "kern". Default is "local0"
+ type: string
+ type: object
+ v4InternalSubnet:
+ description: |-
+ v4InternalSubnet is a v4 subnet used internally by ovn-kubernetes in case the
+ default one is being already used by something else. It must not overlap with
+ any other subnet being used by OpenShift or by the node network. The size of the
+ subnet must be larger than the number of nodes.
+ Default is 100.64.0.0/16
+ type: string
+ v6InternalSubnet:
+ description: |-
+ v6InternalSubnet is a v6 subnet used internally by ovn-kubernetes in case the
+ default one is being already used by something else. It must not overlap with
+ any other subnet being used by OpenShift or by the node network. The size of the
+ subnet must be larger than the number of nodes.
+ Default is fd98::/64
+ type: string
+ type: object
+ x-kubernetes-validations:
+ - message: defaultNetworkNoOverlayOptions is only supported for
+ no-overlay networks
+ rule: '''self.defaultNetworkTransport == "NoOverlay" || !has(self.defaultNetworkNoOverlayOptions)'''
+ - message: bgpManagedConfig is required when DefaultNetworkTransport
+ is NoOverlay, DefaultNetworkNoOverlayOptions is set and DefaultNetworkNoOverlayOptions.Routing="Managed"
+ rule: '''!(self.defaultNetworkTransport == "NoOverlay" && has(self.defaultNetworkNoOverlayOptions)
+ && self.defaultNetworkNoOverlayOptions.routing == "Managed")
+ || has(self.bgpManagedConfig)'''
+ - message: DefaultNetworkTransport field is immutable
+ rule: '''self.defaultNetworkTransport == oldSelf.defaultNetworkTransport'''
+ - message: defaultNetworkNoOverlayOptions field is immutable
+ rule: '''self.defaultNetworkNoOverlayOptions == oldSelf.defaultNetworkNoOverlayOptions'''
+ - message: bgpManagedConfig field is immutable
+ rule: '''self.bgpManagedConfig == oldSelf.bgpManagedConfig'''
+ type:
+ description: |-
+ type is the type of network
+ All NetworkTypes are supported except for NetworkTypeRaw
+ type: string
+ type: object
+ deployKubeProxy:
+ description: |-
+ deployKubeProxy specifies whether or not a standalone kube-proxy should
+ be deployed by the operator. Some network providers include kube-proxy
+ or similar functionality. If unset, the plugin will attempt to select
+ the correct value, which is false when ovn-kubernetes is used and true
+ otherwise.
+ type: boolean
+ disableMultiNetwork:
+ description: |-
+ disableMultiNetwork defaults to 'false' and this setting enables the pod multi-networking capability.
+ disableMultiNetwork when set to 'true' at cluster install time does not install the components, typically the Multus CNI and the network-attachment-definition CRD,
+ that enable the pod multi-networking capability. Setting the parameter to 'true' might be useful when you need install third-party CNI plugins,
+ but these plugins are not supported by Red Hat. Changing the parameter value as a postinstallation cluster task has no effect.
+ type: boolean
+ disableNetworkDiagnostics:
+ default: false
+ description: |-
+ disableNetworkDiagnostics specifies whether or not PodNetworkConnectivityCheck
+ CRs from a test pod to every node, apiserver and LB should be disabled or not.
+ If unset, this property defaults to 'false' and network diagnostics is enabled.
+ Setting this to 'true' would reduce the additional load of the pods performing the checks.
+ type: boolean
+ exportNetworkFlows:
+ description: |-
+ exportNetworkFlows enables and configures the export of network flow metadata from the pod network
+ by using protocols NetFlow, SFlow or IPFIX. Currently only supported on OVN-Kubernetes plugin.
+ If unset, flows will not be exported to any collector.
+ properties:
+ ipfix:
+ description: ipfix defines IPFIX configuration.
+ properties:
+ collectors:
+ description: ipfixCollectors is list of strings formatted
+ as ip:port with a maximum of ten items
+ items:
+ pattern: ^(([0-9]|[0-9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5])\.){3}([0-9]|[0-9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5]):([1-9][0-9]{0,3}|[1-5][0-9]{4}|6[0-4][0-9]{3}|65[0-4][0-9]{2}|655[0-2][0-9]|6553[0-5])$
+ type: string
+ maxItems: 10
+ minItems: 1
+ type: array
+ x-kubernetes-list-type: atomic
+ type: object
+ netFlow:
+ description: netFlow defines the NetFlow configuration.
+ properties:
+ collectors:
+ description: |-
+ netFlow defines the NetFlow collectors that will consume the flow data exported from OVS.
+ It is a list of strings formatted as ip:port with a maximum of ten items
+ items:
+ pattern: ^(([0-9]|[0-9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5])\.){3}([0-9]|[0-9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5]):([1-9][0-9]{0,3}|[1-5][0-9]{4}|6[0-4][0-9]{3}|65[0-4][0-9]{2}|655[0-2][0-9]|6553[0-5])$
+ type: string
+ maxItems: 10
+ minItems: 1
+ type: array
+ x-kubernetes-list-type: atomic
+ type: object
+ sFlow:
+ description: sFlow defines the SFlow configuration.
+ properties:
+ collectors:
+ description: sFlowCollectors is list of strings formatted
+ as ip:port with a maximum of ten items
+ items:
+ pattern: ^(([0-9]|[0-9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5])\.){3}([0-9]|[0-9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5]):([1-9][0-9]{0,3}|[1-5][0-9]{4}|6[0-4][0-9]{3}|65[0-4][0-9]{2}|655[0-2][0-9]|6553[0-5])$
+ type: string
+ maxItems: 10
+ minItems: 1
+ type: array
+ x-kubernetes-list-type: atomic
+ type: object
+ type: object
+ kubeProxyConfig:
+ description: |-
+ kubeProxyConfig lets us configure desired proxy configuration, if
+ deployKubeProxy is true. If not specified, sensible defaults will be chosen by
+ OpenShift directly.
+ properties:
+ bindAddress:
+ description: |-
+ The address to "bind" on
+ Defaults to 0.0.0.0
+ type: string
+ iptablesSyncPeriod:
+ description: |-
+ An internal kube-proxy parameter. In older releases of OCP, this sometimes needed to be adjusted
+ in large clusters for performance reasons, but this is no longer necessary, and there is no reason
+ to change this from the default value.
+ Default: 30s
+ type: string
+ proxyArguments:
+ additionalProperties:
+ description: ProxyArgumentList is a list of arguments to pass
+ to the kubeproxy process
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: atomic
+ description: Any additional arguments to pass to the kubeproxy
+ process
+ type: object
+ type: object
+ logLevel:
+ default: Normal
+ description: |-
+ logLevel is an intent based logging for an overall component. It does not give fine grained control, but it is a
+ simple way to manage coarse grained logging choices that operators have to interpret for their operands.
+
+ Valid values are: "Normal", "Debug", "Trace", "TraceAll".
+ Defaults to "Normal".
+ enum:
+ - ""
+ - Normal
+ - Debug
+ - Trace
+ - TraceAll
+ type: string
+ managementState:
+ description: managementState indicates whether and how the operator
+ should manage the component
+ pattern: ^(Managed|Unmanaged|Force|Removed)$
+ type: string
+ migration:
+ description: |-
+ migration enables and configures cluster network migration, for network changes
+ that cannot be made instantly.
+ properties:
+ features:
+ description: |-
+ features was previously used to configure which network plugin features
+ would be migrated in a network type migration.
+ DEPRECATED: network type migration is no longer supported, and setting
+ this to a non-empty value will result in the network operator rejecting
+ the configuration.
+ properties:
+ egressFirewall:
+ default: true
+ description: |-
+ egressFirewall specified whether or not the Egress Firewall configuration was migrated.
+ DEPRECATED: network type migration is no longer supported.
+ type: boolean
+ egressIP:
+ default: true
+ description: |-
+ egressIP specified whether or not the Egress IP configuration was migrated.
+ DEPRECATED: network type migration is no longer supported.
+ type: boolean
+ multicast:
+ default: true
+ description: |-
+ multicast specified whether or not the multicast configuration was migrated.
+ DEPRECATED: network type migration is no longer supported.
+ type: boolean
+ type: object
+ mode:
+ description: |-
+ mode indicates the mode of network type migration.
+ DEPRECATED: network type migration is no longer supported, and setting
+ this to a non-empty value will result in the network operator rejecting
+ the configuration.
+ enum:
+ - Live
+ - Offline
+ - ""
+ type: string
+ mtu:
+ description: |-
+ mtu contains the MTU migration configuration. Set this to allow changing
+ the MTU values for the default network. If unset, the operation of
+ changing the MTU for the default network will be rejected.
+ properties:
+ machine:
+ description: |-
+ machine contains MTU migration configuration for the machine's uplink.
+ Needs to be migrated along with the default network MTU unless the
+ current uplink MTU already accommodates the default network MTU.
+ properties:
+ from:
+ description: from is the MTU to migrate from.
+ format: int32
+ minimum: 0
+ type: integer
+ to:
+ description: to is the MTU to migrate to.
+ format: int32
+ minimum: 0
+ type: integer
+ type: object
+ network:
+ description: |-
+ network contains information about MTU migration for the default network.
+ Migrations are only allowed to MTU values lower than the machine's uplink
+ MTU by the minimum appropriate offset.
+ properties:
+ from:
+ description: from is the MTU to migrate from.
+ format: int32
+ minimum: 0
+ type: integer
+ to:
+ description: to is the MTU to migrate to.
+ format: int32
+ minimum: 0
+ type: integer
+ type: object
+ type: object
+ networkType:
+ description: |-
+ networkType was previously used when changing the default network type.
+ DEPRECATED: network type migration is no longer supported, and setting
+ this to a non-empty value will result in the network operator rejecting
+ the configuration.
+ type: string
+ type: object
+ observedConfig:
+ description: |-
+ observedConfig holds a sparse config that controller has observed from the cluster state. It exists in spec because
+ it is an input to the level for the operator
+ nullable: true
+ type: object
+ x-kubernetes-preserve-unknown-fields: true
+ operatorLogLevel:
+ default: Normal
+ description: |-
+ operatorLogLevel is an intent based logging for the operator itself. It does not give fine grained control, but it is a
+ simple way to manage coarse grained logging choices that operators have to interpret for themselves.
+
+ Valid values are: "Normal", "Debug", "Trace", "TraceAll".
+ Defaults to "Normal".
+ enum:
+ - ""
+ - Normal
+ - Debug
+ - Trace
+ - TraceAll
+ type: string
+ serviceNetwork:
+ description: |-
+ serviceNetwork is the ip address pool to use for Service IPs
+ Currently, all existing network providers only support a single value
+ here, but this is an array to allow for growth.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: atomic
+ unsupportedConfigOverrides:
+ description: |-
+ unsupportedConfigOverrides overrides the final configuration that was computed by the operator.
+ Red Hat does not support the use of this field.
+ Misuse of this field could lead to unexpected behavior or conflict with other configuration options.
+ Seek guidance from the Red Hat support before using this field.
+ Use of this property blocks cluster upgrades, it must be removed before upgrading your cluster.
+ nullable: true
+ type: object
+ x-kubernetes-preserve-unknown-fields: true
+ useMultiNetworkPolicy:
+ description: |-
+ useMultiNetworkPolicy enables a controller which allows for
+ MultiNetworkPolicy objects to be used on additional networks as
+ created by Multus CNI. MultiNetworkPolicy are similar to NetworkPolicy
+ objects, but NetworkPolicy objects only apply to the primary interface.
+ With MultiNetworkPolicy, you can control the traffic that a pod can receive
+ over the secondary interfaces. If unset, this property defaults to 'false'
+ and MultiNetworkPolicy objects are ignored. If 'disableMultiNetwork' is
+ 'true' then the value of this field is ignored.
+ type: boolean
+ type: object
+ x-kubernetes-validations:
+ - message: invalid value for IPForwarding, valid values are 'Restricted'
+ or 'Global'
+ rule: '!has(self.defaultNetwork) || !has(self.defaultNetwork.ovnKubernetesConfig)
+ || !has(self.defaultNetwork.ovnKubernetesConfig.gatewayConfig) ||
+ !has(self.defaultNetwork.ovnKubernetesConfig.gatewayConfig.ipForwarding)
+ || self.defaultNetwork.ovnKubernetesConfig.gatewayConfig.ipForwarding
+ == oldSelf.defaultNetwork.ovnKubernetesConfig.gatewayConfig.ipForwarding
+ || self.defaultNetwork.ovnKubernetesConfig.gatewayConfig.ipForwarding
+ == ''Restricted'' || self.defaultNetwork.ovnKubernetesConfig.gatewayConfig.ipForwarding
+ == ''Global'''
+ status:
+ description: |-
+ NetworkStatus is detailed operator status, which is distilled
+ up to the Network clusteroperator object.
+ properties:
+ conditions:
+ description: conditions is a list of conditions and their status
+ items:
+ description: OperatorCondition is just the standard condition fields.
+ properties:
+ lastTransitionTime:
+ description: |-
+ lastTransitionTime is the last time the condition transitioned from one status to another.
+ This should be when the underlying condition changed. If that is not known, then using the time when the API field changed is acceptable.
+ format: date-time
+ type: string
+ message:
+ type: string
+ reason:
+ type: string
+ status:
+ description: status of the condition, one of True, False, Unknown.
+ enum:
+ - "True"
+ - "False"
+ - Unknown
+ type: string
+ type:
+ description: type of condition in CamelCase or in foo.example.com/CamelCase.
+ maxLength: 316
+ pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$
+ type: string
+ required:
+ - lastTransitionTime
+ - status
+ - type
+ type: object
+ type: array
+ x-kubernetes-list-map-keys:
+ - type
+ x-kubernetes-list-type: map
+ generations:
+ description: generations are used to determine when an item needs
+ to be reconciled or has changed in a way that needs a reaction.
+ items:
+ description: GenerationStatus keeps track of the generation for
+ a given resource so that decisions about forced updates can be
+ made.
+ properties:
+ group:
+ description: group is the group of the thing you're tracking
+ type: string
+ hash:
+ description: hash is an optional field set for resources without
+ generation that are content sensitive like secrets and configmaps
+ type: string
+ lastGeneration:
+ description: lastGeneration is the last generation of the workload
+ controller involved
+ format: int64
+ type: integer
+ name:
+ description: name is the name of the thing you're tracking
+ type: string
+ namespace:
+ description: namespace is where the thing you're tracking is
+ type: string
+ resource:
+ description: resource is the resource type of the thing you're
+ tracking
+ type: string
+ required:
+ - group
+ - name
+ - namespace
+ - resource
+ type: object
+ type: array
+ x-kubernetes-list-map-keys:
+ - group
+ - resource
+ - namespace
+ - name
+ x-kubernetes-list-type: map
+ latestAvailableRevision:
+ description: latestAvailableRevision is the deploymentID of the most
+ recent deployment
+ format: int32
+ type: integer
+ x-kubernetes-validations:
+ - message: must only increase
+ rule: self >= oldSelf
+ observedGeneration:
+ description: observedGeneration is the last generation change you've
+ dealt with
+ format: int64
+ type: integer
+ readyReplicas:
+ description: readyReplicas indicates how many replicas are ready and
+ at the desired state
+ format: int32
+ type: integer
+ version:
+ description: version is the level this availability applies to
+ type: string
+ type: object
+ type: object
+ served: true
+ storage: true
+ subresources:
+ status: {}
diff --git a/operator/v1/zz_generated.featuregated-crd-manifests/networks.operator.openshift.io/RouteAdvertisements.yaml b/operator/v1/zz_generated.featuregated-crd-manifests/networks.operator.openshift.io/RouteAdvertisements.yaml
index 40b3daf246d..59818866a02 100644
--- a/operator/v1/zz_generated.featuregated-crd-manifests/networks.operator.openshift.io/RouteAdvertisements.yaml
+++ b/operator/v1/zz_generated.featuregated-crd-manifests/networks.operator.openshift.io/RouteAdvertisements.yaml
@@ -602,6 +602,21 @@ spec:
Default is fd98::/64
type: string
type: object
+ x-kubernetes-validations:
+ - message: defaultNetworkNoOverlayOptions is only supported for
+ no-overlay networks
+ rule: '''self.defaultNetworkTransport == "NoOverlay" || !has(self.defaultNetworkNoOverlayOptions)'''
+ - message: bgpManagedConfig is required when DefaultNetworkTransport
+ is NoOverlay, DefaultNetworkNoOverlayOptions is set and DefaultNetworkNoOverlayOptions.Routing="Managed"
+ rule: '''!(self.defaultNetworkTransport == "NoOverlay" && has(self.defaultNetworkNoOverlayOptions)
+ && self.defaultNetworkNoOverlayOptions.routing == "Managed")
+ || has(self.bgpManagedConfig)'''
+ - message: DefaultNetworkTransport field is immutable
+ rule: '''self.defaultNetworkTransport == oldSelf.defaultNetworkTransport'''
+ - message: defaultNetworkNoOverlayOptions field is immutable
+ rule: '''self.defaultNetworkNoOverlayOptions == oldSelf.defaultNetworkNoOverlayOptions'''
+ - message: bgpManagedConfig field is immutable
+ rule: '''self.bgpManagedConfig == oldSelf.bgpManagedConfig'''
type:
description: |-
type is the type of network
diff --git a/operator/v1/zz_generated.swagger_doc_generated.go b/operator/v1/zz_generated.swagger_doc_generated.go
index d3475d9024b..cf531fdad25 100644
--- a/operator/v1/zz_generated.swagger_doc_generated.go
+++ b/operator/v1/zz_generated.swagger_doc_generated.go
@@ -1667,6 +1667,16 @@ func (AdditionalRoutingCapabilities) SwaggerDoc() map[string]string {
return map_AdditionalRoutingCapabilities
}
+var map_BGPManagedConfig = map[string]string{
+ "": "BGPManagedConfig contains configuration options for BGP when routing is \"Managed\".",
+ "asNumber": "asNumber is the 2-byte or 4-byte Autonomous System Number (ASN) to be used in the generated FRR configuration. It is required when NoOverlayOptions.Routing is \"Managed\". Valid values are 1 to 4294967295.",
+ "bgpTopology": "bgpTopology defines the BGP topology to be used. Allowed values are \"fullMesh\". When set to \"fullMesh\", every node deploys a BGP router, forming a BGP full mesh. When omitted, this means the user has no opinion and the platform chooses a reasonable default which is subject to change over time. The current default is \"fullMesh\".",
+}
+
+func (BGPManagedConfig) SwaggerDoc() map[string]string {
+ return map_BGPManagedConfig
+}
+
var map_ClusterNetworkEntry = map[string]string{
"": "ClusterNetworkEntry is a subnet from which to allocate PodIPs. A network of size HostPrefix (in CIDR notation) will be allocated when nodes join the cluster. If the HostPrefix field is not used by the plugin, it can be left unset. Not all network providers support multiple ClusterNetworks",
}
@@ -1894,20 +1904,33 @@ func (NetworkStatus) SwaggerDoc() map[string]string {
return map_NetworkStatus
}
+var map_NoOverlayOptions = map[string]string{
+ "": "NoOverlayOptions contains configuration options for networks operating in no-overlay mode.",
+ "outboundSNAT": "outboundSNAT defines the SNAT behavior for outbound traffic from pods. Allowed values are \"Enable\" and \"Disable\". When set to \"Enable\", SNAT is performed on outbound traffic from pods. When set to \"Disable\", SNAT is not performed and pod IPs are preserved in outbound traffic. This field is required when the network operates in no-overlay mode.",
+ "routing": "routing specifies whether the pod network routing is managed by OVN-Kubernetes or users. Allowed values are \"Managed\" and \"Unmanaged\". When set to \"Managed\", OVN-Kubernetes manages the pod network routing configuration through BGP. When set to \"Unmanaged\", users are responsible for configuring the pod network routing. This field is required when the network operates in no-overlay mode.",
+}
+
+func (NoOverlayOptions) SwaggerDoc() map[string]string {
+ return map_NoOverlayOptions
+}
+
var map_OVNKubernetesConfig = map[string]string{
- "": "ovnKubernetesConfig contains the configuration parameters for networks using the ovn-kubernetes network project",
- "mtu": "mtu is the MTU to use for the tunnel interface. This must be 100 bytes smaller than the uplink mtu. Default is 1400",
- "genevePort": "geneve port is the UDP port to be used by geneve encapulation. Default is 6081",
- "hybridOverlayConfig": "hybridOverlayConfig configures an additional overlay network for peers that are not using OVN.",
- "ipsecConfig": "ipsecConfig enables and configures IPsec for pods on the pod network within the cluster.",
- "policyAuditConfig": "policyAuditConfig is the configuration for network policy audit events. If unset, reported defaults are used.",
- "gatewayConfig": "gatewayConfig holds the configuration for node gateway options.",
- "v4InternalSubnet": "v4InternalSubnet is a v4 subnet used internally by ovn-kubernetes in case the default one is being already used by something else. It must not overlap with any other subnet being used by OpenShift or by the node network. The size of the subnet must be larger than the number of nodes. Default is 100.64.0.0/16",
- "v6InternalSubnet": "v6InternalSubnet is a v6 subnet used internally by ovn-kubernetes in case the default one is being already used by something else. It must not overlap with any other subnet being used by OpenShift or by the node network. The size of the subnet must be larger than the number of nodes. Default is fd98::/64",
- "egressIPConfig": "egressIPConfig holds the configuration for EgressIP options.",
- "ipv4": "ipv4 allows users to configure IP settings for IPv4 connections. When ommitted, this means no opinions and the default configuration is used. Check individual fields within ipv4 for details of default values.",
- "ipv6": "ipv6 allows users to configure IP settings for IPv6 connections. When ommitted, this means no opinions and the default configuration is used. Check individual fields within ipv4 for details of default values.",
- "routeAdvertisements": "routeAdvertisements determines if the functionality to advertise cluster network routes through a dynamic routing protocol, such as BGP, is enabled or not. This functionality is configured through the ovn-kubernetes RouteAdvertisements CRD. Requires the 'FRR' routing capability provider to be enabled as an additional routing capability. Allowed values are \"Enabled\", \"Disabled\" and ommited. When omitted, this means the user has no opinion and the platform is left to choose reasonable defaults. These defaults are subject to change over time. The current default is \"Disabled\".",
+ "": "ovnKubernetesConfig contains the configuration parameters for networks using the ovn-kubernetes network project",
+ "mtu": "mtu is the MTU to use for the tunnel interface. This must be 100 bytes smaller than the uplink mtu. Default is 1400",
+ "genevePort": "geneve port is the UDP port to be used by geneve encapulation. Default is 6081",
+ "hybridOverlayConfig": "hybridOverlayConfig configures an additional overlay network for peers that are not using OVN.",
+ "ipsecConfig": "ipsecConfig enables and configures IPsec for pods on the pod network within the cluster.",
+ "policyAuditConfig": "policyAuditConfig is the configuration for network policy audit events. If unset, reported defaults are used.",
+ "gatewayConfig": "gatewayConfig holds the configuration for node gateway options.",
+ "v4InternalSubnet": "v4InternalSubnet is a v4 subnet used internally by ovn-kubernetes in case the default one is being already used by something else. It must not overlap with any other subnet being used by OpenShift or by the node network. The size of the subnet must be larger than the number of nodes. Default is 100.64.0.0/16",
+ "v6InternalSubnet": "v6InternalSubnet is a v6 subnet used internally by ovn-kubernetes in case the default one is being already used by something else. It must not overlap with any other subnet being used by OpenShift or by the node network. The size of the subnet must be larger than the number of nodes. Default is fd98::/64",
+ "egressIPConfig": "egressIPConfig holds the configuration for EgressIP options.",
+ "ipv4": "ipv4 allows users to configure IP settings for IPv4 connections. When ommitted, this means no opinions and the default configuration is used. Check individual fields within ipv4 for details of default values.",
+ "ipv6": "ipv6 allows users to configure IP settings for IPv6 connections. When ommitted, this means no opinions and the default configuration is used. Check individual fields within ipv4 for details of default values.",
+ "routeAdvertisements": "routeAdvertisements determines if the functionality to advertise cluster network routes through a dynamic routing protocol, such as BGP, is enabled or not. This functionality is configured through the ovn-kubernetes RouteAdvertisements CRD. Requires the 'FRR' routing capability provider to be enabled as an additional routing capability. Allowed values are \"Enabled\", \"Disabled\" and ommited. When omitted, this means the user has no opinion and the platform is left to choose reasonable defaults. These defaults are subject to change over time. The current default is \"Disabled\".",
+ "defaultNetworkTransport": "defaultNetworkTransport describes the transport protocol for east-west traffic for the default network. Allowed values are \"NoOverlay\" and \"Geneve\". When set to \"NoOverlay\", the default network operates in no-overlay mode. When set to \"Geneve\", the default network uses Geneve overlay. When omitted, this means the user has no opinion and the platform chooses a reasonable default which is subject to change over time. The current default is \"Geneve\".",
+ "defaultNetworkNoOverlayOptions": "defaultNetworkNoOverlayOptions contains configuration for no-overlay mode for the default network. It is required when DefaultNetworkTransport is \"NoOverlay\". When omitted, this means the user does not configure no-overlay mode options.",
+ "bgpManagedConfig": "bgpManagedConfig configures the BGP properties for networks (default network or CUDNs) in no-overlay mode that specify routing=\"Managed\" in their NoOverlayOptions. It is required when DefaultNetworkNoOverlayOptions.Routing is set to \"Managed\". When omitted, this means the user does not configure BGP for managed routing.",
}
func (OVNKubernetesConfig) SwaggerDoc() map[string]string {
diff --git a/payload-manifests/featuregates/featureGate-Hypershift-Default.yaml b/payload-manifests/featuregates/featureGate-Hypershift-Default.yaml
index 417c9f9aa17..94d78b7ad8c 100644
--- a/payload-manifests/featuregates/featureGate-Hypershift-Default.yaml
+++ b/payload-manifests/featuregates/featureGate-Hypershift-Default.yaml
@@ -186,6 +186,9 @@
{
"name": "NewOLMWebhookProviderOpenshiftServiceCA"
},
+ {
+ "name": "NoOverlayMode"
+ },
{
"name": "NoRegistryClusterOperations"
},
diff --git a/payload-manifests/featuregates/featureGate-Hypershift-DevPreviewNoUpgrade.yaml b/payload-manifests/featuregates/featureGate-Hypershift-DevPreviewNoUpgrade.yaml
index 937ea4b0691..14ab8427737 100644
--- a/payload-manifests/featuregates/featureGate-Hypershift-DevPreviewNoUpgrade.yaml
+++ b/payload-manifests/featuregates/featureGate-Hypershift-DevPreviewNoUpgrade.yaml
@@ -41,6 +41,9 @@
{
"name": "NewOLMWebhookProviderOpenshiftServiceCA"
},
+ {
+ "name": "NoOverlayMode"
+ },
{
"name": "NoRegistryClusterOperations"
},
diff --git a/payload-manifests/featuregates/featureGate-Hypershift-TechPreviewNoUpgrade.yaml b/payload-manifests/featuregates/featureGate-Hypershift-TechPreviewNoUpgrade.yaml
index 646c3b1f13c..ed5fcffcc3a 100644
--- a/payload-manifests/featuregates/featureGate-Hypershift-TechPreviewNoUpgrade.yaml
+++ b/payload-manifests/featuregates/featureGate-Hypershift-TechPreviewNoUpgrade.yaml
@@ -268,6 +268,9 @@
{
"name": "NetworkSegmentation"
},
+ {
+ "name": "NoOverlayMode"
+ },
{
"name": "NutanixMultiSubnets"
},
diff --git a/payload-manifests/featuregates/featureGate-SelfManagedHA-Default.yaml b/payload-manifests/featuregates/featureGate-SelfManagedHA-Default.yaml
index 9618cf01e02..fd6e56d6924 100644
--- a/payload-manifests/featuregates/featureGate-SelfManagedHA-Default.yaml
+++ b/payload-manifests/featuregates/featureGate-SelfManagedHA-Default.yaml
@@ -180,6 +180,9 @@
{
"name": "NewOLMPreflightPermissionChecks"
},
+ {
+ "name": "NoOverlayMode"
+ },
{
"name": "NoRegistryClusterOperations"
},
diff --git a/payload-manifests/featuregates/featureGate-SelfManagedHA-DevPreviewNoUpgrade.yaml b/payload-manifests/featuregates/featureGate-SelfManagedHA-DevPreviewNoUpgrade.yaml
index bec36643559..04866661451 100644
--- a/payload-manifests/featuregates/featureGate-SelfManagedHA-DevPreviewNoUpgrade.yaml
+++ b/payload-manifests/featuregates/featureGate-SelfManagedHA-DevPreviewNoUpgrade.yaml
@@ -26,6 +26,9 @@
{
"name": "MultiArchInstallAzure"
},
+ {
+ "name": "NoOverlayMode"
+ },
{
"name": "ShortCertRotation"
}
diff --git a/payload-manifests/featuregates/featureGate-SelfManagedHA-TechPreviewNoUpgrade.yaml b/payload-manifests/featuregates/featureGate-SelfManagedHA-TechPreviewNoUpgrade.yaml
index ce7837d6635..2555df0526b 100644
--- a/payload-manifests/featuregates/featureGate-SelfManagedHA-TechPreviewNoUpgrade.yaml
+++ b/payload-manifests/featuregates/featureGate-SelfManagedHA-TechPreviewNoUpgrade.yaml
@@ -265,6 +265,9 @@
{
"name": "NewOLMWebhookProviderOpenshiftServiceCA"
},
+ {
+ "name": "NoOverlayMode"
+ },
{
"name": "NoRegistryClusterOperations"
},