You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/enabling-OVS-balance-slb-mode.adoc
+7Lines changed: 7 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,6 +20,13 @@ The following diagram shows `balance-slb` mode on a simple cluster infrastructur
20
20
.OVS `balance-slb` mode operating on a localnet with two NADs
21
21
image::552_OpenShift_slb_mode_0625.png[OVS `balance-slb` mode ` operating on a localnet with two NADs]
22
22
23
+
[NOTE]
24
+
====
25
+
Consider that an OVS bond with `balance-slb` mode enabled might experience issues if the bond forwards unknown unicast traffic from one physical network interface controller (NIC) into the phsycial network through another NIC. This situation can result in an Layer 2 loop, or _bridge loop_, that in turn causes _MAC flapping_.
26
+
27
+
MAC flapping causes the same MAC address to exist in many network locations for a period of time. For example, a remote switch does not learn the MAC address for the destination of a unicast packet and this causes the packet to exist on all links available on the SLB bond configuration. As a workaround for this issue, you can set the bond to `active-backup` mode during MAC address assignment and then switch the bond to use `balance-slb` mode.
28
+
====
29
+
23
30
You can integrate the `balance-slb` mode interface into primary or secondary network types by using OVS bonding. Note the following points about OVS bonding:
24
31
25
32
* Supports the OVN-Kubernetes CNI plugin and easily integrates with the plugin.
The `active-backup` mode provides fault tolerance for network connections by switching to a backup link where the primary link fails. The mode specifies the following ports for your cluster:
10
+
11
+
* An active port where one physical interface sends and receives traffic at any given time.
12
+
* A standby port where all other ports act as backup links and continously monitor their link status.
13
+
14
+
During a failover process, if an active port or its link fails, the bonding logic switches all network traffic to a standby port. This standby port becomes the new active port. For failover to work, all ports in a bond must share the same Media Access Control (MAC) address.
Copy file name to clipboardExpand all lines: modules/installation-network-user-infra.adoc
+3-9Lines changed: 3 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -89,17 +89,13 @@ During the initial boot, the machines require an IP address configuration that i
89
89
90
90
[NOTE]
91
91
====
92
-
* It is recommended to use a DHCP server for long-term management of the cluster machines. Ensure that the DHCP server is configured to provide persistent IP addresses, DNS server information, and hostnames to the cluster machines.
92
+
* Consider using a DHCP server for long-term management of the cluster machines. Ensure that the DHCP server is configured to provide persistent IP addresses, DNS server information, and hostnames to the cluster machines.
93
93
94
94
* If a DHCP service is not available for your user-provisioned infrastructure, you can instead provide the IP networking configuration and the address of the DNS server to the nodes at {op-system} install time. These can be passed as boot arguments if you are installing from an ISO image. See the _Installing {op-system} and starting the {product-title} bootstrap process_ section for more information about static IP provisioning and advanced networking options.
95
95
====
96
96
endif::ibm-z[]
97
97
98
-
The Kubernetes API server must be able to resolve the node names of the cluster
99
-
machines. If the API servers and worker nodes are in different zones, you can
100
-
configure a default DNS search zone to allow the API server to resolve the
101
-
node names. Another supported approach is to always refer to hosts by their
102
-
fully-qualified domain names in both the node objects and all DNS requests.
98
+
The Kubernetes API server must be able to resolve the node names of the cluster machines. If the API servers and worker nodes are in different zones, you can configure a default DNS search zone to allow the API server to resolve the node names. Another supported approach is to always refer to hosts by their fully-qualified domain names in both the node objects and all DNS requests.
You must configure the network connectivity between machines to allow {product-title} cluster
118
-
components to communicate. Each machine must be able to resolve the hostnames
119
-
of all other machines in the cluster.
113
+
You must configure the network connectivity between machines to allow {product-title} cluster components to communicate. Each machine must be able to resolve the hostnames of all other machines in the cluster.
120
114
121
115
This section provides details about the ports that are required.
Copy file name to clipboardExpand all lines: modules/installation-user-infra-machines-static-network.adoc
+7-4Lines changed: 7 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -220,7 +220,9 @@ ifndef::ibm-z-kvm[]
220
220
221
221
=== Bonding multiple network interfaces to a single interface
222
222
223
-
Optional: You can bond multiple network interfaces to a single interface by using the `bond=` option. Refer to the following examples:
223
+
As an optional configuration, you can bond multiple network interfaces to a single interface by using the `bond=` option. To apply this configuration to your cluster, complete the procedure steps for each node that runs on your cluster.
224
+
225
+
.Procedure
224
226
225
227
* The syntax for configuring a bonded interface is: `bond=<name>[:<network_interfaces>][:options]`
226
228
+
@@ -287,9 +289,9 @@ ifndef::ibm-z[]
287
289
288
290
=== Bonding multiple SR-IOV network interfaces to a dual port NIC interface
289
291
290
-
Optional: You can bond multiple SR-IOV network interfaces to a dual port NIC interface by using the `bond=` option.
292
+
As an optional configuration, you can bond multiple SR-IOV network interfaces to a dual port NIC interface by using the `bond=` option.
291
293
292
-
On each node, you must perform the following tasks:
294
+
.Procedure
293
295
294
296
ifndef::installing-ibm-power[]
295
297
. Create the SR-IOV virtual functions (VFs) following the guidance in link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/configuring_and_managing_virtualization/managing-virtual-devices_configuring-and-managing-virtualization#managing-sr-iov-devices_managing-virtual-devices[Managing SR-IOV devices]. Follow the procedure in the "Attaching SR-IOV networking devices to virtual machines" section.
@@ -308,12 +310,13 @@ The following examples illustrate the syntax you must use:
308
310
309
311
* When you create a bonded interface using `bond=`, you must specify how the IP address is assigned and other information for the bonded interface.
310
312
311
-
** To configure the bonded interface to use DHCP, set the bond's IP address to `dhcp`. For example:
313
+
** To configure the bonded interface to use DHCP, set the `ip` parameter to `dhcp` as demonstrated in the following example:
312
314
+
313
315
[source,terminal]
314
316
----
315
317
bond=bond0:eno1f0,eno2f0:mode=active-backup
316
318
ip=bond0:dhcp
319
+
fail_over_mac=0
317
320
----
318
321
319
322
** To configure the bonded interface to use a static IP address, enter the specific IP address you want and related information. For example:
Kernel bonding is a built-in Linux kernel function where link aggregation can exist among many Ethernet interfaces to create a single logical physical interface. Kernel bonding is the default mode if no bond interfaces depend on OVS bonds. This bonding type does not give the same level of customization as supported OVS bonding.
10
+
11
+
For `kernel-bonding` mode, the bond interfaces exist outside, which means they are not in the data path, of the bridge interface. Network traffic in this mode is not sent or received on the bond interface port but instead requires additional bridging capabilities for MAC address assignment at the kernel level.
12
+
13
+
If you enabled `kernel-bonding` mode on network controller interfaces (NICs) for your nodes, you must specify a Media Access Control (MAC) address failover. This configuration prevents node communication issues with the bond interfaces, such as `eno1f0` and `eno2f0`.
14
+
15
+
Red Hat supports only the following value for the `fail_over_mac` parameter:
16
+
17
+
* `0`: Specifies the `none` value and this is the default value that disables MAC address failover so that all compute nodes receive the same MAC address as the bond interface. With this setting, packets might be sent to inactive nodes.
18
+
19
+
Red Hat does not support the following values for the `fail_over_mac` parameter:
20
+
21
+
* `1`: Specifies the `active` value and sets the MAC address of the primary bond interface to always remain the same as active nodes. If during a failover, the MAC address of a node changes, the MAC address of the bond interface changes to match the new MAC address of the node.
22
+
* `2`: Specifies the `follow` value so that during a failover, an active node gets the MAC address of the bond interface and a formerly active node receives the MAC address of the newly active node.
0 commit comments