Skip to content

Commit dd53bfe

Browse files
authored
Merge pull request #89520 from dfitzmau/OSDOCS-13539
OSDOCS-13539: Updated the nw-ovn-ipsec-disable.adoc command
2 parents 4f045cb + b2ac12f commit dd53bfe

File tree

4 files changed

+41
-10
lines changed

4 files changed

+41
-10
lines changed

modules/nw-ovn-ipsec-disable.adoc

Lines changed: 17 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -10,23 +10,34 @@ As a cluster administrator, you can disable IPsec encryption.
1010

1111
.Prerequisites
1212

13-
* Install the OpenShift CLI (`oc`).
14-
* Log in to the cluster with a user with `cluster-admin` privileges.
13+
* You installed the {oc-first}.
14+
* You logged in to the cluster with a user with `cluster-admin` privileges.
1515
1616
.Procedure
1717

18-
. To disable IPsec encryption, enter the following command:
18+
. Choose one of the following options to disable IPsec encryption:
19+
+
20+
.. Where the `ipsecConfig.mode` parameter is set to either `External` or `Full` and the `ipsecConfig.full` schema is not added to `networks.operator.openshift.io`, enter the following command:
1921
+
2022
[source,terminal]
2123
----
22-
$ oc patch networks.operator.openshift.io cluster --type=merge \
23-
-p '{
24+
$ oc patch networks.operator.openshift.io cluster --type=merge -p \
25+
'{
2426
"spec":{
2527
"defaultNetwork":{
2628
"ovnKubernetesConfig":{
2729
"ipsecConfig":{
2830
"mode":"Disabled"
2931
}}}}}'
3032
----
33+
+
34+
.. Where the `ipsecConfig.mode` parameter is set to `Full` and the `ipsecConfig.full` configuration is added to `networks.operator.openshift.io`, enter the following command:
35+
+
36+
[source,terminal]
37+
----
38+
$ oc patch networks.operator.openshift.io cluster --type='json' -p \
39+
'[{"op": "remove", "path": "/spec/defaultNetwork/ovnKubernetesConfig/ipsecConfig/full"},
40+
{"op": "replace", "path": "/spec/defaultNetwork/ovnKubernetesConfig/ipsecConfig/mode", "value": "Disabled"}]'
41+
----
3142

32-
. Optional: You can increase the size of your cluster MTU by `46` bytes because there is no longer any overhead from the IPsec ESP header in IP packets.
43+
. Optional: You can increase the size of your cluster MTU by `46` bytes because there is no longer any overhead from the IPsec Encapsulating Security Payload (ESP) header in IP packets.

modules/nw-ovn-ipsec-enable.adoc

Lines changed: 22 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
[id="nw-ovn-ipsec-enable_{context}"]
77
= Enabling IPsec encryption
88

9-
As a cluster administrator, you can enable pod-to-pod IPsec encryption, IPsec encryption between the cluster, and external IPsec endpoints.
9+
As a cluster administrator you can enable pod-to-pod IPsec encryption between the cluster and external IPsec endpoints.
1010

1111
You can configure IPsec in either of the following modes:
1212

@@ -18,6 +18,12 @@ You can configure IPsec in either of the following modes:
1818
If you configure IPsec in `Full` mode, you must also complete the "Configuring IPsec encryption for external traffic" procedure.
1919
====
2020

21+
If IPsec is enabled in `Full` mode, as a cluster administrator you can configure options for the mode by adding the `full` schema to `networks.operator.openshift.io`. The `full` schema supports the
22+
`encapsulation` parameter. You can use this parameter to configure network address translation-traversal (NAT-T) encapsulation for IPsec traffic. The `encapsulation` parameter supports the following values:
23+
24+
* `Auto` is the default value and enables UDP encapsulation when `libreswan` detects network address translation (NAT) packets in traffic within a node.
25+
* `Always` enables UDP encapsulation for all traffic types available in a node. This option does not rely upon `libreswan` to detect NAT packets in a node.
26+
2127
.Prerequisites
2228

2329
* Install the {oc-first}.
@@ -41,6 +47,21 @@ $ oc patch networks.operator.openshift.io cluster --type=merge -p \
4147
----
4248
+
4349
<1> Specify `External` to encrypt traffic to external hosts or specify `Full` to encrypt pod-to-pod traffic and, optionally, traffic to external hosts. By default, IPsec is disabled.
50+
+
51+
.Example configuration that has IPsec enabled in `Full` mode and `encapsulation` set to `Always`
52+
[source,terminal]
53+
----
54+
$ oc patch networks.operator.openshift.io cluster --type=merge -p \
55+
'{
56+
"spec":{
57+
"defaultNetwork":{
58+
"ovnKubernetesConfig":{
59+
"ipsecConfig":{
60+
"mode":"Full",
61+
"full":{
62+
"encapsulation": "Always"
63+
}}}}}}'
64+
----
4465

4566
. Encrypt external traffic with IPsec by completing the "Configuring IPsec encryption for external traffic" procedure.
4667

modules/nwt-gateway-mode.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ You can follow the optional step 4 to enable IP forwarding alongside local gatew
2828
$ oc get network.operator cluster -o yaml > network-config-backup.yaml
2929
----
3030

31-
. Set the `routingViaHost` paramemter to `true` for local gateway mode by running the following command:
31+
. Set the `routingViaHost` parameter to `true` for local gateway mode by running the following command:
3232
+
3333
[source,terminal]
3434
----

networking/network_security/configuring-ipsec-ovn.adoc

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,8 +12,7 @@ IPsec is disabled by default. You can enable IPsec either during or after instal
1212

1313
The following support limitations exist for IPsec on a {product-title} cluster:
1414

15-
* You must disable IPsec before updating to {product-title} 4.15. There is a known issue that can cause interruptions in pod-to-pod communication if you update without disabling IPsec. (link:https://issues.redhat.com/browse/OCPBUGS-43323[*OCPBUGS-43323*])
16-
* On {ibm-cloud-name}, IPsec supports only NAT-T. Encapsulating Security Payload (ESP) is not supported on this platform.
15+
* On {ibm-cloud-name}, IPsec supports only network address translation-traversal (NAT-T). Encapsulating Security Payload (ESP) is not supported on this platform.
1716
* If your cluster uses link:https://www.redhat.com/en/topics/containers/what-are-hosted-control-planes[{hcp}] for Red{nbsp}Hat {product-title}, IPsec is not supported for IPsec encryption of either pod-to-pod or traffic to external hosts.
1817
* Using ESP hardware offloading on any network interface is not supported if one or more of those interfaces is attached to Open vSwitch (OVS). Enabling IPsec for your cluster triggers the use of IPsec with interfaces attached to OVS. By default, {product-title} disables ESP hardware offloading on any interfaces attached to OVS.
1918
* If you enabled IPsec for network interfaces that are not attached to OVS, a cluster administrator must manually disable ESP hardware offloading on each interface that is not attached to OVS.

0 commit comments

Comments
 (0)