Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Serve NodePort services on secondary IP addresses #3328

Merged
merged 4 commits into from
Apr 21, 2023

Commits on Apr 7, 2023

  1. Make pokeEndpoint not failing in case of error

    Asserting on `netexec` response to not containing errors
    does not allow using retries, as the test would fail during
    the first attempt.
    
    Signed-off-by: Andrea Panattoni <apanatto@redhat.com>
    zeeke committed Apr 7, 2023
    Configuration menu
    Copy the full SHA
    c1cf2db View commit details
    Browse the repository at this point in the history

Commits on Apr 14, 2023

  1. Improve e2e test assertion message

    Signed-off-by: Andrea Panattoni <apanatto@redhat.com>
    zeeke committed Apr 14, 2023
    Configuration menu
    Copy the full SHA
    09f7548 View commit details
    Browse the repository at this point in the history
  2. Serve NodePort services on every host-addresses

    When a node gets a new IP addresses, node loadbalancers
    should be updated to serve NodePort services on the new
    address.
    
    Update node_tracker.go to track both `host-addresses` and
    `l3-gateway-config` IP addresses, as they are used in different
    ways for building load balancers.
    
    Add End2End test to control-plane suite.
    
    Update load balancer unit tests to include a multi address node.
    
    Signed-off-by: Andrea Panattoni <apanatto@redhat.com>
    zeeke committed Apr 14, 2023
    Configuration menu
    Copy the full SHA
    dde7ea8 View commit details
    Browse the repository at this point in the history

Commits on Apr 21, 2023

  1. Fix ETP iptables for shared gateway mode

    For NodePort Services with ExternalTrafficPolicy = Local,
    incoming connections shouldn't be DNATted to masqueradeIP.
    
    Signed-off-by: Andrea Panattoni <apanatto@redhat.com>
    zeeke committed Apr 21, 2023
    Configuration menu
    Copy the full SHA
    8bd9b3e View commit details
    Browse the repository at this point in the history