Skip to content

Commit a03f633

Browse files
authored
Merge pull request #89322 from rohennes/TELCODOCS-2105
TELCODOCS-2105: Moving from TP to GA for EgressService and Metalb VRF features
2 parents fbdda19 + 6debd56 commit a03f633

File tree

5 files changed

+9
-10
lines changed

5 files changed

+9
-10
lines changed

modules/nw-egress-service-ovn.adoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,7 @@ The following example configures the egress traffic to have the same source IP a
1515
* Install the OpenShift CLI (`oc`).
1616
* Log in as a user with `cluster-admin` privileges.
1717
* You configured MetalLB `BGPPeer` resources.
18+
* You use OVN-Kubernetes configured with the `gatewayConfig.routingViaHost` specification set to `true` only.
1819
1920
.Procedure
2021

modules/nw-metallb-configure-return-traffic-proc.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,11 +10,11 @@ You can configure symmetric network routing for applications behind a MetalLB se
1010

1111
This example associates a VRF routing table with MetalLB and an egress service to enable symmetric routing for ingress and egress traffic for pods behind a `LoadBalancer` service.
1212

13-
[NOTE]
13+
[IMPORTANT]
1414
====
1515
* If you use the `sourceIPBy: "LoadBalancerIP"` setting in the `EgressService` CR, you must specify the load-balancer node in the `BGPAdvertisement` custom resource (CR).
1616
17-
* You can use the `sourceIPBy: "Network"` setting on clusters that use OVN-Kubernetes configured with the `gatewayConfig.routingViaHost` specification set to `true` only. Additionally, if you use the `sourceIPBy: "Network"` setting, you must schedule the application workload on nodes configured with the network VRF instance.
17+
* To configure an egress service for pods behind a load balancer service, you must configure OVN-Kubernetes with the `gatewayConfig.routingViaHost` specification set to `true`. For more information about this configuration, see "Cluster Network Operator in {product-title}" in _Networking Operators_.
1818
====
1919

2020
.Prerequisites

modules/nw-metallb-configure-vrf-bgppeer.adoc

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,9 +8,6 @@
88

99
You can expose a service through a virtual routing and forwarding (VRF) instance by associating a VRF on a network interface with a BGP peer.
1010

11-
:FeatureName: Exposing a service through a VRF on a BGP peer
12-
include::snippets/technology-preview.adoc[]
13-
1411
By using a VRF on a network interface to expose a service through a BGP peer, you can segregate traffic to the service, configure independent routing decisions, and enable multi-tenancy support on a network interface.
1512

1613
[NOTE]

networking/metallb/metallb-configure-return-traffic.adoc

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,9 +10,6 @@ As a cluster administrator, you can effectively manage traffic for pods behind a
1010

1111
To achieve this functionality, learn how to implement virtual routing and forwarding (VRF) instances with MetalLB, and configure egress services.
1212

13-
:FeatureName: Configuring symmetric traffic by using a VRF instance with MetalLB and an egress service
14-
include::snippets/technology-preview.adoc[]
15-
1613
[id="challenges-of-managing-symmetric-routing-with-metallb"]
1714
== Challenges of managing symmetric routing with MetalLB
1815

@@ -62,3 +59,5 @@ include::modules/nw-metallb-configure-return-traffic-proc.adoc[leveloffset=+1]
6259
* xref:../../networking/k8s_nmstate/k8s-nmstate-updating-node-network-config.adoc#virt-example-host-vrf_k8s-nmstate-updating-node-network-config[Example: Network interface with a VRF instance node network configuration policy]
6360

6461
* xref:../../networking/ovn_kubernetes_network_provider/configuring-egress-traffic-for-vrf-loadbalancer-services.adoc#configuring-egress-traffic-loadbalancer-services[Configuring an egress service]
62+
63+
* xref:../../networking/networking_operators/cluster-network-operator.adoc#nw-operator-cr-cno-object_cluster-network-operator[Cluster Network Operator configuration object]

networking/ovn_kubernetes_network_provider/configuring-egress-traffic-for-vrf-loadbalancer-services.adoc

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,8 +8,10 @@ toc::[]
88

99
As a cluster administrator, you can configure egress traffic for pods behind a load balancer service by using an egress service.
1010

11-
:FeatureName: Egress service
12-
include::snippets/technology-preview.adoc[]
11+
[NOTE]
12+
====
13+
To configure an egress service for pods behind a load balancer service, you must configure OVN-Kubernetes with the `gatewayConfig.routingViaHost` specification set to `true`. For more information about this configuration, see xref:../../networking/networking_operators/cluster-network-operator.adoc#nw-operator-cr-cno-object_cluster-network-operator[Cluster Network Operator configuration object] in _Networking Operators_.
14+
====
1315

1416
You can use the `EgressService` custom resource (CR) to manage egress traffic in the following ways:
1517

0 commit comments

Comments
 (0)