Jump To Close Expand all Collapse all Networking 1. Ingress Operator in OpenShift Dedicated Expand section "1. Ingress Operator in OpenShift Dedicated" Collapse section "1. Ingress Operator in OpenShift Dedicated" 1.1. OpenShift Dedicated Ingress Operator 1.2. View the default Ingress Controller 1.3. View Ingress Operator status 1.4. View Ingress Controller logs 1.5. View Ingress Controller status 1.6. OpenShift Dedicated Ingress Operator configurations 2. OpenShift SDN default CNI network provider Expand section "2. OpenShift SDN default CNI network provider" Collapse section "2. OpenShift SDN default CNI network provider" 2.1. Enabling multicast for a project Expand section "2.1. Enabling multicast for a project" Collapse section "2.1. Enabling multicast for a project" 2.1.1. About multicast 2.1.2. Enabling multicast between pods 3. Configuring a cluster-wide proxy Expand section "3. Configuring a cluster-wide proxy" Collapse section "3. Configuring a cluster-wide proxy" 3.1. Prerequisites for configuring a cluster-wide proxy 3.2. Responsibilities for additional trust bundles 3.3. Configuring a proxy during installation 3.4. Configuring a proxy during installation using OpenShift Cluster Manager 3.5. Configuring a proxy after installation 3.6. Configuring a proxy after installation using OpenShift Cluster Manager 4. CIDR range definitions Expand section "4. CIDR range definitions" Collapse section "4. CIDR range definitions" 4.1. Machine CIDR 4.2. Service CIDR 4.3. Pod CIDR 4.4. Host Prefix 5. Network policy Expand section "5. Network policy" Collapse section "5. Network policy" 5.1. About network policy Expand section "5.1. About network policy" Collapse section "5.1. About network policy" 5.1.1. About network policy 5.1.2. Optimizations for network policy 5.1.3. Next steps 5.2. Creating a network policy Expand section "5.2. Creating a network policy" Collapse section "5.2. Creating a network policy" 5.2.1. Example NetworkPolicy object 5.2.2. Creating a network policy using the CLI 5.2.3. Creating a default deny all network policy 5.2.4. Creating a network policy to allow traffic from external clients 5.2.5. Creating a network policy allowing traffic to an application from all namespaces 5.2.6. Creating a network policy allowing traffic to an application from a namespace 5.2.7. Creating a network policy using OpenShift Cluster Manager 5.3. Viewing a network policy Expand section "5.3. Viewing a network policy" Collapse section "5.3. Viewing a network policy" 5.3.1. Example NetworkPolicy object 5.3.2. Viewing network policies using the CLI 5.3.3. Viewing network policies using OpenShift Cluster Manager 5.4. Deleting a network policy Expand section "5.4. Deleting a network policy" Collapse section "5.4. Deleting a network policy" 5.4.1. Deleting a network policy using the CLI 5.4.2. Deleting a network policy using OpenShift Cluster Manager 5.5. Configuring multitenant isolation with network policy Expand section "5.5. Configuring multitenant isolation with network policy" Collapse section "5.5. Configuring multitenant isolation with network policy" 5.5.1. Configuring multitenant isolation by using network policy 6. Configuring Routes Expand section "6. Configuring Routes" Collapse section "6. Configuring Routes" 6.1. Route configuration Expand section "6.1. Route configuration" Collapse section "6.1. Route configuration" 6.1.1. Creating an HTTP-based route 6.1.2. Configuring route timeouts 6.1.3. HTTP Strict Transport Security Expand section "6.1.3. HTTP Strict Transport Security" Collapse section "6.1.3. HTTP Strict Transport Security" 6.1.3.1. Enabling HTTP Strict Transport Security per-route 6.1.3.2. Disabling HTTP Strict Transport Security per-route 6.1.4. Using cookies to keep route statefulness Expand section "6.1.4. Using cookies to keep route statefulness" Collapse section "6.1.4. Using cookies to keep route statefulness" 6.1.4.1. Annotating a route with a cookie 6.1.5. Path-based routes 6.1.6. Route-specific annotations 6.1.7. Creating a route using the default certificate through an Ingress object 6.1.8. Creating a route using the destination CA certificate in the Ingress annotation 6.2. Secured routes Expand section "6.2. Secured routes" Collapse section "6.2. Secured routes" 6.2.1. Creating a re-encrypt route with a custom certificate 6.2.2. Creating an edge route with a custom certificate 6.2.3. Creating a passthrough route Legal Notice Settings Close Language: English 简体中文 日本語 Language: English 简体中文 日本語 Format: Multi-page Single-page PDF ePub Format: Multi-page Single-page PDF ePub Language and Page Formatting Options Language: English 简体中文 日本語 Language: English 简体中文 日本語 Format: Multi-page Single-page PDF ePub Format: Multi-page Single-page PDF ePub Networking OpenShift Dedicated 4Configuring OpenShift Dedicated networkingRed Hat OpenShift Documentation TeamLegal NoticeAbstract This document provides information about networking for OpenShift Dedicated clusters. Next