[PSUPCLPL-15272] IPIP connectivity check rework #652
Merged
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Description
network.ipip_connectivity
task incheck_iaas
could return incorrect results due to IaaS level firewall rules. For instance, in OpenStack set ofIptables
rules that implements theSecurity Group
. ThatIptables
rules allow theESTABLISHED
andRELATED
packets which leads to the following case. IPIP packets moving from VM-1 to VM-2 are blocked, but the IPIP packets from VM-2 to VM-1 are allowed as they look likeRELATED
packets whereas, IPIP traffic is not allowed inSecurity Group
at all for VM-1 and VM-2.ipip_check
Solution
network.ipip_connectivity
proceduresport
parameterHow to apply
Not applicable
Test Cases
TestCase 1
Check if the new approach is working
Test Configuration:
Steps:
Security Group
to allow all IPv4 egress traffic and not allow IPIP ingress traffic.check_iaas
with--tasks "network.ipip_connectivity"
option several times in a row.Security Group
to allow IPIP ingress traffic for some of the cluster nodes.check_iaas
with--tasks "network.ipip_connectivity"
option several time in a row.Results:
Security Group
rulesSecurity Group
rulesSecurity Group
rulesSecurity Group
rulesChecklist