Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bug 2069740: Avoid kubernetes node port range #3044

Merged
merged 1 commit into from
Apr 5, 2022

Conversation

cybertron
Copy link
Member

Per [0], the range 30000-32767 is used for kubernetes node ports.
We should not have haproxy listening in that range to avoid possible
conflicts.

0: https://github.com/openshift/openshift-docs/blob/main/modules/installation-network-user-infra.adoc

- What I did

- How to verify it

- Description for the changelog
Move the haproxy listening port out of the kubernetes node port range to avoid conflicts.

@cybertron
Copy link
Member Author

/test e2e-metal-ipi

@kikisdeliveryservice
Copy link
Contributor

/test e2e-vsphere
/test e2e-vsphere-upgrade

@@ -20,7 +20,7 @@ contents:
bind :::{{`{{ .LBConfig.LbPort }}`}} v4v6
default_backend masters
listen health_check_http_url
bind :::30936 v4v6
bind :::20936 v4v6
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Shouldn't this be in the 9000-9999 range and ideally be specifically reserved (as node exporter and CVO are)?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I had left this out of the range because I thought it could be changed to listen on only localhost, but when I tried that it doesn't work so yeah, I'll have to change it.

Copy link
Member

@cgwalters cgwalters left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Marking as requested changes to try to better track PR review status

Per [0], the range 30000-32767 is used for kubernetes node ports.
We should not have haproxy listening in that range to avoid possible
conflicts.

9444 is adjacent to 9445 where the haproxy frontend listens, but is
currently unused in the host port registry.

0: https://github.com/openshift/openshift-docs/blob/main/modules/installation-network-user-infra.adoc
Copy link
Member

@cgwalters cgwalters left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks sane to me. Do you know if we have any official process for reserving ports in our reserved range? Maybe it should be in openshift/api or something?

Anyways no need to block on that. Will defer lgtm to someone on the on-prem team.

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Apr 1, 2022
@cybertron
Copy link
Member Author

IIUC, the document in the enhancements repo is the authoritative source for port allocations. I have a review up to add our ports: openshift/enhancements#1076

I was going to hold that one until we had actually moved our ports to valid ranges, but I suppose there's an argument that the ports should be reserved in the doc first. I mostly just want to get all of these patches merged so we can stop playing whack-a-mole with port conflicts. :-)

@cybertron cybertron changed the title Avoid kubernetes node port range Bug 2069740: Avoid kubernetes node port range Apr 1, 2022
@openshift-ci openshift-ci bot added bugzilla/severity-medium Referenced Bugzilla bug's severity is medium for the branch this PR is targeting. bugzilla/invalid-bug Indicates that a referenced Bugzilla bug is invalid for the branch this PR is targeting. labels Apr 1, 2022
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Apr 1, 2022

@cybertron: This pull request references Bugzilla bug 2069740, which is invalid:

  • expected the bug to target the "4.11.0" release, but it targets "---" instead

Comment /bugzilla refresh to re-evaluate validity if changes to the Bugzilla bug are made, or edit the title of this pull request to link to a different bug.

In response to this:

Bug 2069740: Avoid kubernetes node port range

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@cybertron
Copy link
Member Author

/bugzilla refresh

@openshift-ci openshift-ci bot added bugzilla/valid-bug Indicates that a referenced Bugzilla bug is valid for the branch this PR is targeting. and removed bugzilla/invalid-bug Indicates that a referenced Bugzilla bug is invalid for the branch this PR is targeting. labels Apr 1, 2022
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Apr 1, 2022

@cybertron: This pull request references Bugzilla bug 2069740, which is valid. The bug has been moved to the POST state. The bug has been updated to refer to the pull request using the external bug tracker.

3 validation(s) were run on this bug
  • bug is open, matching expected state (open)
  • bug target release (4.11.0) matches configured target release for branch (4.11.0)
  • bug is in the state ASSIGNED, which is one of the valid states (NEW, ASSIGNED, ON_DEV, POST, POST)

No GitHub users were found matching the public email listed for the QA contact in Bugzilla (vvoronko@redhat.com), skipping review request.

In response to this:

/bugzilla refresh

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@cybertron
Copy link
Member Author

/cc @mandre @jcpowermac @rvanderp3 @creydr @dougsland
/test e2e-openstack
/test e2e-metal-ipi
/test e2e-vsphere

@creydr
Copy link
Member

creydr commented Apr 4, 2022

/retest-required

@mandre
Copy link
Member

mandre commented Apr 4, 2022

/test e2e-openstack

Copy link
Contributor

@dougsland dougsland left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Apr 4, 2022
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Apr 4, 2022

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: cgwalters, cybertron, dougsland

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@mandre
Copy link
Member

mandre commented Apr 4, 2022

/hold
The failure in e2e-openstack is suspicious. I'd like to make sure this is not caused by the patch.

@openshift-ci openshift-ci bot added the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Apr 4, 2022
@mandre
Copy link
Member

mandre commented Apr 4, 2022

Weird, the masters didn't join the cluster and we're not getting any logs.
/test e2e-openstack

@mandre
Copy link
Member

mandre commented Apr 4, 2022

OpenStack CI is on fire 🔥
One last try:
/test e2e-openstack

@mandre
Copy link
Member

mandre commented Apr 4, 2022

/hold cancel
OpenStack CI isn't in a good shape. I don't want to unnecessarily block this PR, so let's merge it now and fix openstack platform later if needed.

@openshift-ci openshift-ci bot removed the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Apr 4, 2022
@openshift-bot
Copy link
Contributor

/retest-required

Please review the full test history for this PR and help us cut down flakes.

3 similar comments
@openshift-bot
Copy link
Contributor

/retest-required

Please review the full test history for this PR and help us cut down flakes.

@openshift-bot
Copy link
Contributor

/retest-required

Please review the full test history for this PR and help us cut down flakes.

@openshift-bot
Copy link
Contributor

/retest-required

Please review the full test history for this PR and help us cut down flakes.

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Apr 5, 2022

@cybertron: The following tests failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/e2e-vsphere-upgrade 4502c9e7393958344b48f064069d2942c78fe7c3 link false /test e2e-vsphere-upgrade
ci/prow/e2e-openstack 675c770 link false /test e2e-openstack

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@openshift-merge-robot openshift-merge-robot merged commit be77042 into openshift:master Apr 5, 2022
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Apr 5, 2022

@cybertron: Some pull requests linked via external trackers have merged:

The following pull requests linked via external trackers have not merged:

These pull request must merge or be unlinked from the Bugzilla bug in order for it to move to the next state. Once unlinked, request a bug refresh with /bugzilla refresh.

Bugzilla bug 2069740 has not been moved to the MODIFIED state.

In response to this:

Bug 2069740: Avoid kubernetes node port range

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@cybertron
Copy link
Member Author

/cherry-pick release-4.10

@openshift-cherrypick-robot

@cybertron: new pull request created: #3145

In response to this:

/cherry-pick release-4.10

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

This pull request was closed.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. bugzilla/severity-medium Referenced Bugzilla bug's severity is medium for the branch this PR is targeting. bugzilla/valid-bug Indicates that a referenced Bugzilla bug is valid for the branch this PR is targeting. lgtm Indicates that a PR is ready to be merged.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

9 participants