Skip to content

Commit 3918e2f

Browse files
committed
OSDOCS-13291-main:removes TP for UDN
1 parent 0bf7336 commit 3918e2f

File tree

1 file changed

+1
-14
lines changed

1 file changed

+1
-14
lines changed

networking/multiple_networks/primary_networks/about-user-defined-networks.adoc

Lines changed: 1 addition & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,6 @@ include::_attributes/common-attributes.adoc[]
66

77
toc::[]
88

9-
:featurename: `UserDefinedNetwork`
10-
include::snippets/technology-preview.adoc[]
119

1210
Before the implementation of user-defined networks (UDNs) in the default the OVN-Kubernetes CNI plugin for {product-title}, the Kubernetes Layer 3 topology was supported as the primary network, or _main_ network, to where all pods attach. The Kubernetes design principle requires that all pods communicate with each other by their IP addresses, and Kubernetes restricts inter-pod traffic according to the Kubernetes network policy. While the Kubernetes design is useful for simple deployments, the Layer 3 topology restricts customization of primary network segment configurations, especially for modern multi-tenant deployments.
1311

@@ -22,25 +20,14 @@ image::527-OpenShift-UDN-isolation-012025.png[The namespace isolation concept in
2220
Support for the Localnet topology on both primary and secondary networks will be added in a future version of {product-title}.
2321
====
2422

25-
Unlike a network attachment definition (NAD), which is only namespaced scope, a cluster administrator can use a UDN to create and define additional networks that span multiple namespaces at the cluster level by leveraging the `ClusterUserDefinedNetwork` custom resource (CR). Additionally, a cluster administrator or a cluster user can use a UDN to define additional networks at the namespace level with the `UserDefinedNetwork` CR.
23+
A cluster administrator can use a user-defined network to create and define additional networks that span multiple namespaces at the cluster level by leveraging the `ClusterUserDefinedNetwork` custom resource (CR). Additionally, a cluster administrator or a cluster user can use a user-defined network to define additional networks at the namespace level with the `UserDefinedNetwork` CR.
2624

2725
The following diagram shows tenant isolation that a cluster administrator created by defining a `ClusterUserDefinedNetwork` (CR) for each tenant. This network configuration allows a network to span across many namespaces. In the diagram, the `udn-1` disconnected network selects `namespace-1` and `namespace-2`, while the `udn-2` disconnected network selects `namespace-3` and `namespace-4`. A tenant acts as a disconnected network that is isolated from other tenants' networks. Pods from a namespace can communicate with pods in another namespace only if those namespaces exist in the same tenant network.
2826

2927
image::528-OpenShift-multitenant-0225.png[The tenant isolation concept in a user-defined network (UDN)]
3028

3129
The following sections further emphasize the benefits and limitations of user-defined networks, the best practices when creating a `ClusterUserDefinedNetwork` or `UserDefinedNetwork` custom resource, how to create the custom resource, and additional configuration details that might be relevant to your deployment.
3230

33-
// Looks like this may be out for 4.17, but in for 4.18 as of 8/19/24
34-
//. Ingress and egress support
35-
//+
36-
//* **Support for ingress and egress traffic**: Cluster ingress and egress traffic is supported for both primary and secondary networks.
37-
//* **Support for ingress and egress features**: User-defined networks support support the following ingress and egress features:
38-
//+
39-
//** EgressQoS
40-
//** EgressService
41-
//** EgressIP
42-
//** Load balancer and NodePort services, and services with external IPs.
43-
4431
//benefits of UDN
4532
include::modules/nw-udn-benefits.adoc[leveloffset=+1]
4633

0 commit comments

Comments
 (0)