-
Notifications
You must be signed in to change notification settings - Fork 193
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
need-fragmentation ICMPs are not propagated back to pods in OVN #1278
Comments
I have attempted forcing the return of icmp packets related to known connections into the ovn-k8s-sub0 interface, with no luck.
One possibility could be creating an ICMP reflector in the submariner-gateway go that sees the ICMP and pushes it to the right interface, still... we need to figure out what's happening when a pod is not on the gateway and the icmp is encapsulated via geneve |
This clamps the maximum segment size on the TCP negotiation when addressing remote clusters with OVN. With the OVN implementation we have an issue where the need-frag ICMPs used for PMTU discovery are sent into the wront interface by the kernel, this limits the scope of the issue, although it introduces a performance penalty for jumboframe capable networks. Fixes-Issue: submariner-io#1278 Signed-off-by: Miguel Angel Ajo <majopela@redhat.com>
Moving this to 0.10 to keep track, since #1294 only proposes a workaround. |
This clamps the maximum segment size on the TCP negotiation when addressing remote clusters with OVN. With the OVN implementation we have an issue where the need-frag ICMPs used for PMTU discovery are sent into the wront interface by the kernel, this limits the scope of the issue, although it introduces a performance penalty for jumboframe capable networks. Fixes-Issue: #1278 Signed-off-by: Miguel Angel Ajo <majopela@redhat.com>
Otherwise the host-network traffic from the gateway to a remote cluster fails to work when fragmentation is necessary. Fixes-Issue: submariner-io#1278 Signed-off-by: Miguel Angel Ajo <majopela@redhat.com>
Otherwise the host-network traffic from the gateway to a remote cluster fails to work when fragmentation is necessary. Fixes-Issue: #1278 Signed-off-by: Miguel Angel Ajo <majopela@redhat.com>
This issue has been automatically marked as stale because it has not had activity for 60 days. It will be closed if no further activity occurs. Please make a comment if this issue/pr is still valid. Thank you for your contributions. |
bump |
This still seems important, but we don't have anyone working on OVN right now. If someone wants to dig in, that would be much appreciated. |
@vthapar @sridhargaddam is this bug still relevant with the new 0.13 OVN implementation? |
New implementation won't fix this bug, but it may no longer be an issue in latest OVN/OCP. So we need to test and confirm if this is still a valid bug. |
Should we close and reopen if needed, or would you prefer to keep this open for now? |
I think @aswinsuryan wanted to try this once in his OSP/AWS Cluster setup and if there is no issue, we can close it. |
@aswinsuryan my understating is that you are planning to verify this. Please update if the issue is still seen with recent devel/0.13.0-rc0 |
@nyechiel yes I am trying to verify this, the setup has some issue and the network-plugin syncer pod is not coming up. Will keep posted. |
Thanks. Please keep us posted. If the |
The test are passing in the below setup
Cluster1
Cluster2
The test passed with AWS as first cluster and RHOS as the second and vice-versa.
|
What happened:
A bug in core-ovn avoids ICMPs being propagated back from the the gateway nodes
to the pods.
for example:
is not propagated back into the geneve tunnel down to the pod ^.
Previously this workaround was effective in avoiding such issue, but in later ovn-kubernetes or core-ovn implementations the ovn bug is triggering again.
64f68da
What you expected to happen:
E2E tests passing, the ICMPs for need-frag being propagated back to the pdos.
How to reproduce it (as minimally and precisely as possible):
Install with OCP 4.5..4.7 and run the E2E tests.
Anything else we need to know?:
This workaround (far from ideal), mitigates the issue:
iptables -I FORWARD -o ovn-k8s-gw0 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --set-mss 1398
but introduces performance penalties, and it's only limited to TCP, this won't work for UDP packets.
We should:
This is also related (not exactly equal, to: #1022 )
Environment:
subctl version
): 0.8.1 or 0.9.0-rc0The text was updated successfully, but these errors were encountered: