Jump To Close Expand all Collapse all Table of contents Networking 1. Understanding networking Expand section "1. Understanding networking" Collapse section "1. Understanding networking" 1.1. OpenShift Container Platform DNS 2. Accessing hosts Expand section "2. Accessing hosts" Collapse section "2. Accessing hosts" 2.1. Accessing hosts on Amazon Web Services in an installer-provisioned infrastructure cluster 3. Cluster Network Operator in OpenShift Container Platform Expand section "3. Cluster Network Operator in OpenShift Container Platform" Collapse section "3. Cluster Network Operator in OpenShift Container Platform" 3.1. Cluster Network Operator 3.2. Viewing the cluster network configuration 3.3. Viewing Cluster Network Operator status 3.4. Viewing Cluster Network Operator logs 3.5. Cluster Network Operator configuration Expand section "3.5. Cluster Network Operator configuration" Collapse section "3.5. Cluster Network Operator configuration" 3.5.1. Configuration parameters for the OpenShift SDN default CNI network provider 3.5.2. Configuration parameters for the OVN-Kubernetes default CNI network provider 3.5.3. Cluster Network Operator example configuration 4. DNS Operator in OpenShift Container Platform Expand section "4. DNS Operator in OpenShift Container Platform" Collapse section "4. DNS Operator in OpenShift Container Platform" 4.1. DNS Operator 4.2. View the default DNS 4.3. Using DNS forwarding 4.4. DNS Operator status 4.5. DNS Operator logs 5. Ingress Operator in OpenShift Container Platform Expand section "5. Ingress Operator in OpenShift Container Platform" Collapse section "5. Ingress Operator in OpenShift Container Platform" 5.1. The Ingress configuration asset 5.2. Ingress controller configuration parameters Expand section "5.2. Ingress controller configuration parameters" Collapse section "5.2. Ingress controller configuration parameters" 5.2.1. Ingress controller TLS profiles 5.2.2. Ingress controller endpoint publishing strategy 5.3. View the default Ingress Controller 5.4. View Ingress Operator status 5.5. View Ingress Controller logs 5.6. View Ingress Controller status 6. Configuring the Ingress Controller Expand section "6. Configuring the Ingress Controller" Collapse section "6. Configuring the Ingress Controller" 6.1. Setting a custom default certificate 6.2. Scaling an Ingress Controller 6.3. Configuring Ingress access logging 6.4. Ingress Controller sharding Expand section "6.4. Ingress Controller sharding" Collapse section "6.4. Ingress Controller sharding" 6.4.1. Configuring Ingress Controller sharding by using route labels 6.4.2. Configuring Ingress Controller sharding by using namespace labels 6.5. Configuring an Ingress Controller to use an internal load balancer 6.6. Configuring the default Ingress Controller for your cluster to be internal 6.7. Configuring the route admission policy 6.8. Using wildcard routes 6.9. Enabling HTTP/2 Ingress connectivity 6.10. Additional resources 7. Using the Stream Control Transmission Protocol (SCTP) on a bare metal cluster Expand section "7. Using the Stream Control Transmission Protocol (SCTP) on a bare metal cluster" Collapse section "7. Using the Stream Control Transmission Protocol (SCTP) on a bare metal cluster" 7.1. Support for Stream Control Transmission Protocol (SCTP) on OpenShift Container Platform Expand section "7.1. Support for Stream Control Transmission Protocol (SCTP) on OpenShift Container Platform" Collapse section "7.1. Support for Stream Control Transmission Protocol (SCTP) on OpenShift Container Platform" 7.1.1. Example configurations using SCTP protocol 7.2. Enabling Stream Control Transmission Protocol (SCTP) 7.3. Verifying Stream Control Transmission Protocol (SCTP) is enabled 8. Configuring PTP hardware Expand section "8. Configuring PTP hardware" Collapse section "8. Configuring PTP hardware" 8.1. About PTP hardware 8.2. Automated discovery of PTP network devices 8.3. Installing the PTP Operator Expand section "8.3. Installing the PTP Operator" Collapse section "8.3. Installing the PTP Operator" 8.3.1. CLI: Installing the PTP Operator 8.3.2. Web console: Installing the PTP Operator 8.4. Configuring Linuxptp services 9. Network policy Expand section "9. Network policy" Collapse section "9. Network policy" 9.1. About network policy Expand section "9.1. About network policy" Collapse section "9.1. About network policy" 9.1.1. About network policy 9.1.2. Optimizations for network policy 9.1.3. Next steps 9.1.4. Additional resources 9.2. Creating a network policy Expand section "9.2. Creating a network policy" Collapse section "9.2. Creating a network policy" 9.2.1. Creating a network policy 9.2.2. Example NetworkPolicy object 9.3. Viewing a network policy Expand section "9.3. Viewing a network policy" Collapse section "9.3. Viewing a network policy" 9.3.1. Viewing network policies 9.3.2. Example NetworkPolicy object 9.4. Editing a network policy Expand section "9.4. Editing a network policy" Collapse section "9.4. Editing a network policy" 9.4.1. Editing a network policy 9.4.2. Example NetworkPolicy object 9.4.3. Additional resources 9.5. Deleting a network policy Expand section "9.5. Deleting a network policy" Collapse section "9.5. Deleting a network policy" 9.5.1. Deleting a network policy 9.6. Defining a default network policy for projects Expand section "9.6. Defining a default network policy for projects" Collapse section "9.6. Defining a default network policy for projects" 9.6.1. Modifying the template for new projects 9.6.2. Adding network policies to the new project template 9.7. Configuring multitenant isolation with network policy Expand section "9.7. Configuring multitenant isolation with network policy" Collapse section "9.7. Configuring multitenant isolation with network policy" 9.7.1. Configuring multitenant isolation by using network policy 9.7.2. Next steps 9.7.3. Additional resources 10. Multiple networks Expand section "10. Multiple networks" Collapse section "10. Multiple networks" 10.1. Understanding multiple networks Expand section "10.1. Understanding multiple networks" Collapse section "10.1. Understanding multiple networks" 10.1.1. Usage scenarios for an additional network 10.1.2. Additional networks in OpenShift Container Platform 10.2. Attaching a pod to an additional network Expand section "10.2. Attaching a pod to an additional network" Collapse section "10.2. Attaching a pod to an additional network" 10.2.1. Adding a pod to an additional network Expand section "10.2.1. Adding a pod to an additional network" Collapse section "10.2.1. Adding a pod to an additional network" 10.2.1.1. Specifying pod-specific addressing and routing options 10.3. Removing a pod from an additional network Expand section "10.3. Removing a pod from an additional network" Collapse section "10.3. Removing a pod from an additional network" 10.3.1. Removing a pod from an additional network 10.4. Configuring a bridge network Expand section "10.4. Configuring a bridge network" Collapse section "10.4. Configuring a bridge network" 10.4.1. Creating an additional network attachment with the bridge CNI plug-in Expand section "10.4.1. Creating an additional network attachment with the bridge CNI plug-in" Collapse section "10.4.1. Creating an additional network attachment with the bridge CNI plug-in" 10.4.1.1. Configuration for bridge Expand section "10.4.1.1. Configuration for bridge" Collapse section "10.4.1.1. Configuration for bridge" 10.4.1.1.1. bridge configuration example 10.4.1.2. Configuration for ipam CNI plug-in Expand section "10.4.1.2. Configuration for ipam CNI plug-in" Collapse section "10.4.1.2. Configuration for ipam CNI plug-in" 10.4.1.2.1. Static IP address assignment configuration 10.4.1.2.2. Dynamic IP address assignment configuration 10.4.1.2.3. Dynamic IP address assignment configuration with Whereabouts 10.4.1.2.4. Static IP address assignment configuration example 10.4.1.2.5. Dynamic IP address assignment configuration example using DHCP 10.4.1.2.6. Dynamic IP address assignment configuration example using Whereabouts 10.4.2. Next steps 10.5. Configuring a host-device network Expand section "10.5. Configuring a host-device network" Collapse section "10.5. Configuring a host-device network" 10.5.1. Creating an additional network attachment with the host-device CNI plug-in Expand section "10.5.1. Creating an additional network attachment with the host-device CNI plug-in" Collapse section "10.5.1. Creating an additional network attachment with the host-device CNI plug-in" 10.5.1.1. Configuration for host-device Expand section "10.5.1.1. Configuration for host-device" Collapse section "10.5.1.1. Configuration for host-device" 10.5.1.1.1. host-device configuration example 10.5.1.2. Configuration for ipam CNI plug-in Expand section "10.5.1.2. Configuration for ipam CNI plug-in" Collapse section "10.5.1.2. Configuration for ipam CNI plug-in" 10.5.1.2.1. Static IP address assignment configuration 10.5.1.2.2. Dynamic IP address assignment configuration 10.5.1.2.3. Dynamic IP address assignment configuration with Whereabouts 10.5.1.2.4. Static IP address assignment configuration example 10.5.1.2.5. Dynamic IP address assignment configuration example using DHCP 10.5.1.2.6. Dynamic IP address assignment configuration example using Whereabouts 10.5.2. Next steps 10.6. Configuring an ipvlan network Expand section "10.6. Configuring an ipvlan network" Collapse section "10.6. Configuring an ipvlan network" 10.6.1. Creating an additional network attachment with the ipvlan CNI plug-in Expand section "10.6.1. Creating an additional network attachment with the ipvlan CNI plug-in" Collapse section "10.6.1. Creating an additional network attachment with the ipvlan CNI plug-in" 10.6.1.1. Configuration for ipvlan Expand section "10.6.1.1. Configuration for ipvlan" Collapse section "10.6.1.1. Configuration for ipvlan" 10.6.1.1.1. ipvlan configuration example 10.6.1.2. Configuration for ipam CNI plug-in Expand section "10.6.1.2. Configuration for ipam CNI plug-in" Collapse section "10.6.1.2. Configuration for ipam CNI plug-in" 10.6.1.2.1. Static IP address assignment configuration 10.6.1.2.2. Dynamic IP address assignment configuration 10.6.1.2.3. Dynamic IP address assignment configuration with Whereabouts 10.6.1.2.4. Static IP address assignment configuration example 10.6.1.2.5. Dynamic IP address assignment configuration example using DHCP 10.6.1.2.6. Dynamic IP address assignment configuration example using Whereabouts 10.6.2. Next steps 10.7. Configuring a macvlan network with basic customizations Expand section "10.7. Configuring a macvlan network with basic customizations" Collapse section "10.7. Configuring a macvlan network with basic customizations" 10.7.1. Creating an additional network attachment with the macvlan CNI plug-in Expand section "10.7.1. Creating an additional network attachment with the macvlan CNI plug-in" Collapse section "10.7.1. Creating an additional network attachment with the macvlan CNI plug-in" 10.7.1.1. Configuration for macvlan CNI plug-in Expand section "10.7.1.1. Configuration for macvlan CNI plug-in" Collapse section "10.7.1.1. Configuration for macvlan CNI plug-in" 10.7.1.1.1. macvlan configuration example 10.7.1.2. Configuration for ipam CNI plug-in Expand section "10.7.1.2. Configuration for ipam CNI plug-in" Collapse section "10.7.1.2. Configuration for ipam CNI plug-in" 10.7.1.2.1. Static ipam configuration YAML 10.7.1.2.2. Dynamic ipam configuration YAML 10.7.1.2.3. Static IP address assignment configuration example 10.7.1.2.4. Dynamic IP address assignment configuration example 10.7.2. Next steps 10.8. Configuring a macvlan network Expand section "10.8. Configuring a macvlan network" Collapse section "10.8. Configuring a macvlan network" 10.8.1. Creating an additional network attachment with the macvlan CNI plug-in Expand section "10.8.1. Creating an additional network attachment with the macvlan CNI plug-in" Collapse section "10.8.1. Creating an additional network attachment with the macvlan CNI plug-in" 10.8.1.1. Configuration for macvlan CNI plug-in Expand section "10.8.1.1. Configuration for macvlan CNI plug-in" Collapse section "10.8.1.1. Configuration for macvlan CNI plug-in" 10.8.1.1.1. macvlan configuration example 10.8.1.2. Configuration for ipam CNI plug-in Expand section "10.8.1.2. Configuration for ipam CNI plug-in" Collapse section "10.8.1.2. Configuration for ipam CNI plug-in" 10.8.1.2.1. Static IP address assignment configuration 10.8.1.2.2. Dynamic IP address assignment configuration 10.8.1.2.3. Dynamic IP address assignment configuration with Whereabouts 10.8.1.2.4. Static IP address assignment configuration example 10.8.1.2.5. Dynamic IP address assignment configuration example using DHCP 10.8.1.2.6. Dynamic IP address assignment configuration example using Whereabouts 10.8.2. Next steps 10.9. Editing an additional network Expand section "10.9. Editing an additional network" Collapse section "10.9. Editing an additional network" 10.9.1. Modifying an additional network attachment definition 10.10. Removing an additional network Expand section "10.10. Removing an additional network" Collapse section "10.10. Removing an additional network" 10.10.1. Removing an additional network attachment definition 11. Hardware networks Expand section "11. Hardware networks" Collapse section "11. Hardware networks" 11.1. About Single Root I/O Virtualization (SR-IOV) hardware networks Expand section "11.1. About Single Root I/O Virtualization (SR-IOV) hardware networks" Collapse section "11.1. About Single Root I/O Virtualization (SR-IOV) hardware networks" 11.1.1. Components that manage SR-IOV network devices Expand section "11.1.1. Components that manage SR-IOV network devices" Collapse section "11.1.1. Components that manage SR-IOV network devices" 11.1.1.1. Supported devices 11.1.1.2. Automated discovery of SR-IOV network devices Expand section "11.1.1.2. Automated discovery of SR-IOV network devices" Collapse section "11.1.1.2. Automated discovery of SR-IOV network devices" 11.1.1.2.1. Example SriovNetworkNodeState object 11.1.1.3. Example use of a virtual function in a pod 11.1.2. Next steps 11.2. Installing the SR-IOV Network Operator Expand section "11.2. Installing the SR-IOV Network Operator" Collapse section "11.2. Installing the SR-IOV Network Operator" 11.2.1. Installing SR-IOV Network Operator Expand section "11.2.1. Installing SR-IOV Network Operator" Collapse section "11.2.1. Installing SR-IOV Network Operator" 11.2.1.1. CLI: Installing the SR-IOV Network Operator 11.2.1.2. Web console: Installing the SR-IOV Network Operator 11.2.2. Next steps 11.3. Configuring the SR-IOV Network Operator Expand section "11.3. Configuring the SR-IOV Network Operator" Collapse section "11.3. Configuring the SR-IOV Network Operator" 11.3.1. Configuring the SR-IOV Network Operator Expand section "11.3.1. Configuring the SR-IOV Network Operator" Collapse section "11.3.1. Configuring the SR-IOV Network Operator" 11.3.1.1. About the Network Resources Injector 11.3.1.2. About the SR-IOV Operator admission controller webhook 11.3.1.3. About custom node selectors 11.3.1.4. Disabling or enabling the Network Resources Injector 11.3.1.5. Disabling or enabling the SR-IOV Operator admission controller webhook 11.3.1.6. Configuring a custom NodeSelector for the SR-IOV Network Config daemon 11.3.2. Next steps 11.4. Configuring an SR-IOV network device Expand section "11.4. Configuring an SR-IOV network device" Collapse section "11.4. Configuring an SR-IOV network device" 11.4.1. SR-IOV network node configuration object Expand section "11.4.1. SR-IOV network node configuration object" Collapse section "11.4.1. SR-IOV network node configuration object" 11.4.1.1. Virtual function (VF) partitioning for SR-IOV devices 11.4.2. Configuring SR-IOV network devices 11.4.3. Next steps 11.5. Configuring an SR-IOV Ethernet network attachment Expand section "11.5. Configuring an SR-IOV Ethernet network attachment" Collapse section "11.5. Configuring an SR-IOV Ethernet network attachment" 11.5.1. Ethernet device configuration object Expand section "11.5.1. Ethernet device configuration object" Collapse section "11.5.1. Ethernet device configuration object" 11.5.1.1. Configuration for ipam CNI plug-in Expand section "11.5.1.1. Configuration for ipam CNI plug-in" Collapse section "11.5.1.1. Configuration for ipam CNI plug-in" 11.5.1.1.1. Static IP address assignment configuration 11.5.1.1.2. Dynamic IP address assignment configuration 11.5.1.1.3. Dynamic IP address assignment configuration with Whereabouts 11.5.1.1.4. Static IP address assignment configuration example 11.5.1.1.5. Dynamic IP address assignment configuration example using DHCP 11.5.1.1.6. Dynamic IP address assignment configuration example using Whereabouts 11.5.2. Configuring SR-IOV additional network 11.5.3. Next steps 11.5.4. Additional resources 11.6. Adding a pod to an SR-IOV additional network Expand section "11.6. Adding a pod to an SR-IOV additional network" Collapse section "11.6. Adding a pod to an SR-IOV additional network" 11.6.1. Runtime configuration for a network attachment Expand section "11.6.1. Runtime configuration for a network attachment" Collapse section "11.6.1. Runtime configuration for a network attachment" 11.6.1.1. Runtime configuration for an Ethernet-based SR-IOV attachment 11.6.2. Adding a pod to an additional network 11.6.3. Creating a non-uniform memory access (NUMA) aligned SR-IOV pod 11.6.4. Additional resources 11.7. Using high performance multicast Expand section "11.7. Using high performance multicast" Collapse section "11.7. Using high performance multicast" 11.7.1. Configuring high performance multicast 11.7.2. Using an SR-IOV interface for multicast 11.8. Using virtual functions (VFs) with DPDK and RDMA modes Expand section "11.8. Using virtual functions (VFs) with DPDK and RDMA modes" Collapse section "11.8. Using virtual functions (VFs) with DPDK and RDMA modes" 11.8.1. Examples of using virtual functions in DPDK and RDMA modes 11.8.2. Prerequisites 11.8.3. Example use of virtual function (VF) in DPDK mode with Intel NICs 11.8.4. Example use of a virtual function in DPDK mode with Mellanox NICs 11.8.5. Example of a virtual function in RDMA mode with Mellanox NICs 12. OpenShift SDN default CNI network provider Expand section "12. OpenShift SDN default CNI network provider" Collapse section "12. OpenShift SDN default CNI network provider" 12.1. About the OpenShift SDN default CNI network provider Expand section "12.1. About the OpenShift SDN default CNI network provider" Collapse section "12.1. About the OpenShift SDN default CNI network provider" 12.1.1. OpenShift SDN network isolation modes 12.1.2. Supported default CNI network provider feature matrix 12.2. Configuring egress IPs for a project Expand section "12.2. Configuring egress IPs for a project" Collapse section "12.2. Configuring egress IPs for a project" 12.2.1. Egress IP address assignment for project egress traffic Expand section "12.2.1. Egress IP address assignment for project egress traffic" Collapse section "12.2.1. Egress IP address assignment for project egress traffic" 12.2.1.1. Considerations when using automatically assigned egress IP addresses 12.2.1.2. Considerations when using manually assigned egress IP addresses 12.2.2. Configuring automatically assigned egress IP addresses for a namespace 12.2.3. Configuring manually assigned egress IP addresses for a namespace 12.3. Configuring an egress firewall to control access to external IP addresses Expand section "12.3. Configuring an egress firewall to control access to external IP addresses" Collapse section "12.3. Configuring an egress firewall to control access to external IP addresses" 12.3.1. How an egress firewall works in a project Expand section "12.3.1. How an egress firewall works in a project" Collapse section "12.3.1. How an egress firewall works in a project" 12.3.1.1. Limitations of an egress firewall 12.3.1.2. Matching order for egress network policy rules 12.3.1.3. How Domain Name Server (DNS) resolution works 12.3.2. EgressNetworkPolicy custom resource (CR) object Expand section "12.3.2. EgressNetworkPolicy custom resource (CR) object" Collapse section "12.3.2. EgressNetworkPolicy custom resource (CR) object" 12.3.2.1. EgressNetworkPolicy rules 12.3.2.2. Example EgressNetworkPolicy CR object 12.3.3. Creating an egress firewall policy object 12.4. Editing an egress firewall for a project Expand section "12.4. Editing an egress firewall for a project" Collapse section "12.4. Editing an egress firewall for a project" 12.4.1. Editing an EgressNetworkPolicy object 12.4.2. EgressNetworkPolicy custom resource (CR) object Expand section "12.4.2. EgressNetworkPolicy custom resource (CR) object" Collapse section "12.4.2. EgressNetworkPolicy custom resource (CR) object" 12.4.2.1. EgressNetworkPolicy rules 12.4.2.2. Example EgressNetworkPolicy CR object 12.5. Removing an egress firewall from a project Expand section "12.5. Removing an egress firewall from a project" Collapse section "12.5. Removing an egress firewall from a project" 12.5.1. Removing an EgressNetworkPolicy object 12.6. Considerations for the use of an egress router pod Expand section "12.6. Considerations for the use of an egress router pod" Collapse section "12.6. Considerations for the use of an egress router pod" 12.6.1. About an egress router pod Expand section "12.6.1. About an egress router pod" Collapse section "12.6.1. About an egress router pod" 12.6.1.1. Egress router modes 12.6.1.2. Egress router pod implementation 12.6.1.3. Deployment considerations 12.6.1.4. Failover configuration 12.6.2. Additional resources 12.7. Deploying an egress router pod in redirect mode Expand section "12.7. Deploying an egress router pod in redirect mode" Collapse section "12.7. Deploying an egress router pod in redirect mode" 12.7.1. Egress router pod specification for redirect mode 12.7.2. Egress destination configuration format 12.7.3. Deploying an egress router pod in redirect mode 12.7.4. Additional resources 12.8. Deploying an egress router pod in HTTP proxy mode Expand section "12.8. Deploying an egress router pod in HTTP proxy mode" Collapse section "12.8. Deploying an egress router pod in HTTP proxy mode" 12.8.1. Egress router pod specification for HTTP mode 12.8.2. Egress destination configuration format 12.8.3. Deploying an egress router pod in HTTP proxy mode 12.8.4. Additional resources 12.9. Deploying an egress router pod in DNS proxy mode Expand section "12.9. Deploying an egress router pod in DNS proxy mode" Collapse section "12.9. Deploying an egress router pod in DNS proxy mode" 12.9.1. Egress router pod specification for DNS mode 12.9.2. Egress destination configuration format 12.9.3. Deploying an egress router pod in DNS proxy mode 12.9.4. Additional resources 12.10. Configuring an egress router pod destination list from a config map Expand section "12.10. Configuring an egress router pod destination list from a config map" Collapse section "12.10. Configuring an egress router pod destination list from a config map" 12.10.1. Configuring an egress router destination mappings with a config map 12.10.2. Additional resources 12.11. Enabling multicast for a project Expand section "12.11. Enabling multicast for a project" Collapse section "12.11. Enabling multicast for a project" 12.11.1. About multicast 12.11.2. Enabling multicast between pods 12.12. Disabling multicast for a project Expand section "12.12. Disabling multicast for a project" Collapse section "12.12. Disabling multicast for a project" 12.12.1. Disabling multicast between pods 12.13. Configuring network isolation using OpenShift SDN Expand section "12.13. Configuring network isolation using OpenShift SDN" Collapse section "12.13. Configuring network isolation using OpenShift SDN" 12.13.1. Prerequisites 12.13.2. Joining projects 12.13.3. Isolating a project 12.13.4. Disabling network isolation for a project 12.14. Configuring kube-proxy Expand section "12.14. Configuring kube-proxy" Collapse section "12.14. Configuring kube-proxy" 12.14.1. About iptables rules synchronization 12.14.2. kube-proxy configuration parameters 12.14.3. Modifying the kube-proxy configuration 13. OVN-Kubernetes default CNI network provider Expand section "13. OVN-Kubernetes default CNI network provider" Collapse section "13. OVN-Kubernetes default CNI network provider" 13.1. About the OVN-Kubernetes default Container Network Interface (CNI) network provider Expand section "13.1. About the OVN-Kubernetes default Container Network Interface (CNI) network provider" Collapse section "13.1. About the OVN-Kubernetes default Container Network Interface (CNI) network provider" 13.1.1. OVN-Kubernetes features 13.1.2. Supported default CNI network provider feature matrix 13.1.3. Exposed metrics for OVN-Kubernetes 13.2. Migrate from the OpenShift SDN default CNI network provider Expand section "13.2. Migrate from the OpenShift SDN default CNI network provider" Collapse section "13.2. Migrate from the OpenShift SDN default CNI network provider" 13.2.1. Migrating to the OVN-Kubernetes default CNI network provider 13.3. Rollback to the OpenShift SDN network provider Expand section "13.3. Rollback to the OpenShift SDN network provider" Collapse section "13.3. Rollback to the OpenShift SDN network provider" 13.3.1. Rolling back the default CNI network provider to OpenShift SDN 13.4. Enabling multicast for a project Expand section "13.4. Enabling multicast for a project" Collapse section "13.4. Enabling multicast for a project" 13.4.1. About multicast 13.4.2. Enabling multicast between pods 13.5. Disabling multicast for a project Expand section "13.5. Disabling multicast for a project" Collapse section "13.5. Disabling multicast for a project" 13.5.1. Disabling multicast between pods 14. Configuring Routes Expand section "14. Configuring Routes" Collapse section "14. Configuring Routes" 14.1. Route configuration Expand section "14.1. Route configuration" Collapse section "14.1. Route configuration" 14.1.1. Configuring route timeouts 14.1.2. Enabling HTTP strict transport security 14.1.3. Troubleshooting throughput issues 14.1.4. Using cookies to keep route statefulness Expand section "14.1.4. Using cookies to keep route statefulness" Collapse section "14.1.4. Using cookies to keep route statefulness" 14.1.4.1. Annotating a route with a cookie 14.1.5. Path-based routes 14.1.6. Route-specific annotations 14.1.7. Configuring the route admission policy 14.2. Secured routes Expand section "14.2. Secured routes" Collapse section "14.2. Secured routes" 14.2.1. Creating a re-encrypt route with a custom certificate 14.2.2. Creating an edge route with a custom certificate 14.2.3. Creating a passthrough route 15. Configuring ingress cluster traffic Expand section "15. Configuring ingress cluster traffic" Collapse section "15. Configuring ingress cluster traffic" 15.1. Configuring ingress cluster traffic overview 15.2. Configuring ExternalIPs for services Expand section "15.2. Configuring ExternalIPs for services" Collapse section "15.2. Configuring ExternalIPs for services" 15.2.1. Prerequisites 15.2.2. About ExternalIP Expand section "15.2.2. About ExternalIP" Collapse section "15.2.2. About ExternalIP" 15.2.2.1. Configuration for ExternalIP 15.2.2.2. Restrictions on the assignment of an external IP address 15.2.2.3. Example policy objects 15.2.3. ExternalIP address block configuration 15.2.4. Configure external IP address blocks for your cluster 15.2.5. Next steps 15.3. Configuring ingress cluster traffic using an Ingress Controller Expand section "15.3. Configuring ingress cluster traffic using an Ingress Controller" Collapse section "15.3. Configuring ingress cluster traffic using an Ingress Controller" 15.3.1. Using Ingress Controllers and routes 15.3.2. Prerequisites 15.3.3. Creating a project and service 15.3.4. Exposing the service by creating a route 15.3.5. Configuring Ingress Controller sharding by using route labels 15.3.6. Configuring Ingress Controller sharding by using namespace labels 15.3.7. Additional resources 15.4. Configuring ingress cluster traffic using a load balancer Expand section "15.4. Configuring ingress cluster traffic using a load balancer" Collapse section "15.4. Configuring ingress cluster traffic using a load balancer" 15.4.1. Using a load balancer to get traffic into the cluster 15.4.2. Prerequisites 15.4.3. Creating a project and service 15.4.4. Exposing the service by creating a route 15.4.5. Creating a load balancer service 15.5. Configuring ingress cluster traffic for a service external IP Expand section "15.5. Configuring ingress cluster traffic for a service external IP" Collapse section "15.5. Configuring ingress cluster traffic for a service external IP" 15.5.1. Prerequisites 15.5.2. Attaching an ExternalIP to a service 15.5.3. Additional resources 15.6. Configuring ingress cluster traffic using a NodePort Expand section "15.6. Configuring ingress cluster traffic using a NodePort" Collapse section "15.6. Configuring ingress cluster traffic using a NodePort" 15.6.1. Using a NodePort to get traffic into the cluster 15.6.2. Prerequisites 15.6.3. Creating a project and service 15.6.4. Exposing the service by creating a route 16. Configuring the cluster-wide proxy Expand section "16. Configuring the cluster-wide proxy" Collapse section "16. Configuring the cluster-wide proxy" 16.1. Prerequisites 16.2. Enabling the cluster-wide proxy 16.3. Removing the cluster-wide proxy 17. Configuring a custom PKI Expand section "17. Configuring a custom PKI" Collapse section "17. Configuring a custom PKI" 17.1. Configuring the cluster-wide proxy during installation 17.2. Enabling the cluster-wide proxy 17.3. Certificate injection using Operators 18. Load balancing on RHOSP Expand section "18. Load balancing on RHOSP" Collapse section "18. Load balancing on RHOSP" 18.1. Using the Octavia OVN load balancer provider driver with Kuryr SDN 18.2. Scaling clusters for application traffic by using Octavia Expand section "18.2. Scaling clusters for application traffic by using Octavia" Collapse section "18.2. Scaling clusters for application traffic by using Octavia" 18.2.1. Scaling clusters by using Octavia 18.2.2. Scaling clusters that use Kuryr by using Octavia 18.3. Scaling for ingress traffic by using RHOSP Octavia 法律通告 Settings Close Language: 简体中文 日本語 English Language: 简体中文 日本語 English Format: Multi-page Single-page Format: Multi-page Single-page Language and Page Formatting Options Language: 简体中文 日本語 English Language: 简体中文 日本語 English Format: Multi-page Single-page Format: Multi-page Single-page 4.4. DNS Operator status You can inspect the status and view the details of the DNS Operator using the oc describe command. Procedure View the status of the DNS Operator: $ oc describe clusteroperators/dns Previous Next