New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bug 1936920: networkpolicy: pass traffic through NAT to handle possible tuple collisions #272
Bug 1936920: networkpolicy: pass traffic through NAT to handle possible tuple collisions #272
Conversation
…isions If a pod makes connections to the same destination pod via a service VIP and directly to the pod's IP address, it may be the case that both connections choose the same source port. After the service VIP connection is DNAT-ed to the destination pod's IP address, both connections will have the same 4-tuple. When conntrack processes the second connection's TCP SYN and attempts to commit the conntrack state, the commit fails due to the tuple collision. To prevent the commit failure, make sure SNAT is done on the source port during the commit in case of a collision. The use of a fake "0.0.0.0" address (an undocumented "feature" of OVS that will soon be formalized) ensures that only the source port will be touched if necessary. Note that the packets won't be manipulated if they don't need to be, even though they are passed through NAT. Flow change suggested by Eelco Chaudron and Flavio Leitner Additional fixes by Dan Winship
@openshift-cherrypick-robot: Bugzilla bug 1910378 has been cloned as Bugzilla bug 1936920. Retitling PR to link against new bug. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
@openshift-cherrypick-robot: This pull request references Bugzilla bug 1936920, which is valid. The bug has been moved to the POST state. The bug has been updated to refer to the pull request using the external bug tracker. 6 validation(s) were run on this bug
Requesting review from QA contact: In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/lgtm |
@danwinship: once the present PR merges, I will cherry-pick it on top of release-4.6 in a new PR and assign it to you. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: danwinship, openshift-cherrypick-robot The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/retest Please review the full test history for this PR and help us cut down flakes. |
1 similar comment
/retest Please review the full test history for this PR and help us cut down flakes. |
@openshift-cherrypick-robot: All pull requests linked via external trackers have merged: Bugzilla bug 1936920 has been moved to the MODIFIED state. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
@danwinship: new pull request created: #274 In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
This is an automated cherry-pick of #269
/assign danwinship