Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bug 1954302: Remove OVS daemonsets #1076

Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
1 change: 0 additions & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -229,7 +229,6 @@ data:
ip-10-0-135-96.us-east-2.compute.internal: |
OVN_KUBE_LOG_LEVEL=5
OVN_LOG_LEVEL=dbg
OVS_LOG_LEVEL=dbg
# to adjust master log levels, use _master
_master: |
OVN_KUBE_LOG_LEVEL=5
Expand Down
9 changes: 0 additions & 9 deletions bindata/network/openshift-sdn/alert-rules.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -15,15 +15,6 @@ spec:
# note: all joins on kube_pod_* need a a "topk by (key) (1, <metric> )"
# otherwise you will generate query errors when kube_state_metrics is being
# upgraded and there are duplicate rows on the "right" side of the join.
- alert: NodeWithoutOVSPod
annotations:
message: |
All nodes should be running an ovs pod, {{"{{"}} $labels.node {{"}}"}} is not.
expr: |
(kube_node_info unless on(node) topk by (node) (1, kube_pod_info{namespace="openshift-sdn", pod=~"ovs.*"})) > 0
for: 10m
labels:
severity: warning
- alert: NodeWithoutSDNPod
annotations:
message: |
Expand Down
122 changes: 0 additions & 122 deletions bindata/network/openshift-sdn/sdn-ovs.yaml

This file was deleted.

152 changes: 0 additions & 152 deletions bindata/network/ovn-kubernetes/006-ovs-node.yaml

This file was deleted.

2 changes: 0 additions & 2 deletions bindata/network/ovn-kubernetes/ipsec.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -206,8 +206,6 @@ spec:
sleep 60
done
env:
- name: OVS_LOG_LEVEL
value: info
- name: K8S_NODE
valueFrom:
fieldRef:
Expand Down
1 change: 0 additions & 1 deletion pkg/network/openshift_sdn.go
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,6 @@ func renderOpenShiftSDN(conf *operv1.NetworkSpec, manifestDir string) ([]*uns.Un

data := render.MakeRenderData()
data.Data["ReleaseVersion"] = os.Getenv("RELEASE_VERSION")
data.Data["InstallOVS"] = (c.UseExternalOpenvswitch == nil || *c.UseExternalOpenvswitch == false)
data.Data["SDNImage"] = os.Getenv("SDN_IMAGE")
data.Data["CNIPluginsImage"] = os.Getenv("CNI_PLUGINS_IMAGE")
data.Data["KubeRBACProxyImage"] = os.Getenv("KUBE_RBAC_PROXY_IMAGE")
Expand Down
11 changes: 0 additions & 11 deletions pkg/network/openshift_sdn_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -43,24 +43,13 @@ func TestRenderOpenShiftSDN(t *testing.T) {

crd := OpenShiftSDNConfig.DeepCopy()
config := &crd.Spec
sdnConfig := config.DefaultNetwork.OpenShiftSDNConfig

errs := validateOpenShiftSDN(config)
g.Expect(errs).To(HaveLen(0))
FillDefaults(config, nil)

// Make sure the OVS daemonset isn't created
truth := true
sdnConfig.UseExternalOpenvswitch = &truth
objs, err := renderOpenShiftSDN(config, manifestDir)
g.Expect(err).NotTo(HaveOccurred())
g.Expect(objs).NotTo(ContainElement(HaveKubernetesID("DaemonSet", "openshift-sdn", "ovs")))

// enable openvswitch
sdnConfig.UseExternalOpenvswitch = nil
objs, err = renderOpenShiftSDN(config, manifestDir)
g.Expect(err).NotTo(HaveOccurred())
g.Expect(objs).To(ContainElement(HaveKubernetesID("DaemonSet", "openshift-sdn", "ovs")))

// It's important that the namespace is first
g.Expect(objs[0]).To(HaveKubernetesID("Namespace", "", "openshift-sdn"))
Expand Down