{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":498634382,"defaultBranch":"master","name":"cluster-network-operator","ownerLogin":"pperiyasamy","currentUserCanPush":false,"isFork":true,"isEmpty":false,"createdAt":"2022-06-01T07:28:36.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/30619230?v=4","public":true,"private":false,"isOrgOwned":false},"refInfo":{"name":"","listCacheKey":"v0:1722501746.0","currentOid":""},"activityList":{"items":[{"before":"29843fac24b92f8916977aefda78e3af2c0e32d0","after":"9d88c895a89bf6745cef4f4b35e556ba28b1471b","ref":"refs/heads/debug-mcp-pause-ipsec-blocking-upgrade","pushedAt":"2024-08-21T13:26:50.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"pperiyasamy","name":"Periyasamy Palanisamy","path":"/pperiyasamy","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/30619230?s=80&v=4"},"commit":{"message":"Move to use newer IPsec DaemonSets when MCP is in paused state\n\nWhen MCP is in paused state, network operator continues to render older\nIPsec daemonsets which blocks network cluster operator not getting upgraded\nto newer version. Hence this commit renders newer IPsec daemonsets for\nintermediate period. When MCPs are moved to unpaused state and IPsec machine\nconfigs are installed on it, then it goes ahead with rendering only host\nflavored IPsec daemonset.\n\nSigned-off-by: Periyasamy Palanisamy \n(cherry picked from commit 64be52482981c75ed387b0e497dddb047778f13e)","shortMessageHtmlLink":"Move to use newer IPsec DaemonSets when MCP is in paused state"}},{"before":"93d90130eab551f557b527e4d3738cd6939cdf97","after":"90a160840478cf36861e85b5920f073914a19b20","ref":"refs/heads/mcp-pause-ipsec-4.17","pushedAt":"2024-08-10T00:30:40.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"pperiyasamy","name":"Periyasamy Palanisamy","path":"/pperiyasamy","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/30619230?s=80&v=4"},"commit":{"message":"Move to use newer IPsec DaemonSets when MCP is in paused state\n\nWhen MCP is in paused state, network operator continues to render older\nIPsec daemonsets which blocks network cluster operator not getting upgraded\nto newer version. Hence this commit renders newer IPsec daemonsets for\nintermediate period. When MCPs are moved to unpaused state and IPsec machine\nconfigs are installed on it, then it goes ahead with rendering only host\nflavored IPsec daemonset.\n\nSigned-off-by: Periyasamy Palanisamy ","shortMessageHtmlLink":"Move to use newer IPsec DaemonSets when MCP is in paused state"}},{"before":"b6ff6df7cd04bd3cb97b04cb5b8c76164fd2c2dc","after":"d035fdd12134b557fdce055ed29f87fcbf40fdbf","ref":"refs/heads/master","pushedAt":"2024-08-09T05:49:19.000Z","pushType":"push","commitsCount":19,"pusher":{"login":"pperiyasamy","name":"Periyasamy Palanisamy","path":"/pperiyasamy","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/30619230?s=80&v=4"},"commit":{"message":"Merge pull request #2466 from qinqon/multus-add-openshift-cnv-as-global-namespace\n\nOCPBUGS-38176: multus, Add openshift-cnv to globalNamespace","shortMessageHtmlLink":"Merge pull request openshift#2466 from qinqon/multus-add-openshift-cn…"}},{"before":"00057484c2da00026844b76d1e6a7d414664bfc7","after":"51b6f31312fcbc13ad9dedfa03f3b55608dbfc7c","ref":"refs/heads/debug-ipsec","pushedAt":"2024-08-08T04:21:26.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"pperiyasamy","name":"Periyasamy Palanisamy","path":"/pperiyasamy","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/30619230?s=80&v=4"},"commit":{"message":"Configure narrowing=yes for IPsec connections\n\nThough IPsec mesh configuration is established for all the cluster nodes, IPsec\nsession is not established at times on a certain pair of nodes and pod traffic\nis no longer works between those nodes. We can not find out the reason why that\nhappens. After the discussion with libreswan team, narrowing=yes connection\nparameter helps to recover from the issue. Hence this commit rolls out this\nconfig for all IPsec connections.\n\nSigned-off-by: Periyasamy Palanisamy ","shortMessageHtmlLink":"Configure narrowing=yes for IPsec connections"}},{"before":"352204038905f1cac6ba84b0709163d3d73e5ae3","after":"5f6efe540cd9996080c873ad6a065862b0824966","ref":"refs/heads/mcp-watcher","pushedAt":"2024-08-05T08:53:47.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"pperiyasamy","name":"Periyasamy Palanisamy","path":"/pperiyasamy","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/30619230?s=80&v=4"},"commit":{"message":"Add machine config watcher for status manager\n\nThis enhances status manager to watch for machine config and machine\nconfig pool objects, retrieves machine config pool status when ipsec\nis enabled and when any one of the machine config pool goes into\ndegraded state, then makes network operator also into degraded state.\n\nSigned-off-by: Periyasamy Palanisamy ","shortMessageHtmlLink":"Add machine config watcher for status manager"}},{"before":"b32b0677f695dc065d33c05e9cea7fd3575cb664","after":"93d90130eab551f557b527e4d3738cd6939cdf97","ref":"refs/heads/mcp-pause-ipsec-4.17","pushedAt":"2024-08-01T09:17:32.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"pperiyasamy","name":"Periyasamy Palanisamy","path":"/pperiyasamy","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/30619230?s=80&v=4"},"commit":{"message":"Move to use newer IPsec DaemonSets when MCP is in paused state\n\nWhen MCP is in paused state, network operator continues to render older\nIPsec daemonsets which blocks network cluster operator not getting upgraded\nto newer version. Hence this commit renders newer IPsec daemonsets for\nintermediate period. When MCPs are moved to unpaused state and IPsec machine\nconfigs are installed on it, then it goes ahead with rendering only host\nflavored IPsec daemonset.\n\nSigned-off-by: Periyasamy Palanisamy ","shortMessageHtmlLink":"Move to use newer IPsec DaemonSets when MCP is in paused state"}},{"before":null,"after":"b32b0677f695dc065d33c05e9cea7fd3575cb664","ref":"refs/heads/mcp-pause-ipsec-4.17","pushedAt":"2024-08-01T08:42:26.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"pperiyasamy","name":"Periyasamy Palanisamy","path":"/pperiyasamy","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/30619230?s=80&v=4"},"commit":{"message":"Move to use newer IPsec DaemonSets when MCP is in paused state\n\nWhen MCP is in paused state, network operator continues to render older\nIPsec daemonsets which blocks network cluster operator not getting upgraded\nto newer version. Hence this commit renders newer IPsec daemonsets for\nintermediate period. When MCPs are moved to unpaused state and IPsec machine\nconfigs are installed on it, then it goes ahead with rendering only host\nflavored IPsec daemonset.\n\nSigned-off-by: Periyasamy Palanisamy ","shortMessageHtmlLink":"Move to use newer IPsec DaemonSets when MCP is in paused state"}},{"before":"b454d8d06272bc4788c0b51bbf6970f6021b1dbb","after":"b6ff6df7cd04bd3cb97b04cb5b8c76164fd2c2dc","ref":"refs/heads/master","pushedAt":"2024-08-01T08:40:22.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"pperiyasamy","name":"Periyasamy Palanisamy","path":"/pperiyasamy","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/30619230?s=80&v=4"},"commit":{"message":"Merge pull request #2451 from danwinship/iptables-alerter-errors\n\nOCPBUGS-37713: Handle random crictl errors in iptables-alerter","shortMessageHtmlLink":"Merge pull request openshift#2451 from danwinship/iptables-alerter-er…"}},{"before":"1673415d392279ece74cb77f68d342a1d9e5f9f0","after":"92fd451ec288d99ebaf53e99d848f84348162bc4","ref":"refs/heads/mcp-pause-ipsec-4.16","pushedAt":"2024-08-01T08:10:04.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"pperiyasamy","name":"Periyasamy Palanisamy","path":"/pperiyasamy","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/30619230?s=80&v=4"},"commit":{"message":"Move to use newer IPsec DaemonSets when MCP is in paused state\n\nWhen MCP is in paused state, network operator continues to render older\nIPsec daemonsets which blocks network cluster operator not getting upgraded\nto newer version. Hence this commit renders newer IPsec daemonsets for\nintermediate period. When MCPs are moved to unpaused state and IPsec machine\nconfigs are installed on it, then it goes ahead with rendering only host\nflavored IPsec daemonset.\n\nSigned-off-by: Periyasamy Palanisamy ","shortMessageHtmlLink":"Move to use newer IPsec DaemonSets when MCP is in paused state"}},{"before":"f98c120b3e5feb058f94890eb0466db4fcf283e6","after":"1673415d392279ece74cb77f68d342a1d9e5f9f0","ref":"refs/heads/mcp-pause-ipsec-4.16","pushedAt":"2024-08-01T07:37:35.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"pperiyasamy","name":"Periyasamy Palanisamy","path":"/pperiyasamy","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/30619230?s=80&v=4"},"commit":{"message":"Move to use newer IPsec DaemonSets when MCP is in paused state\n\nWhen MCP is in paused state, network operator continues to render older\nIPsec daemonsets which blocks network cluster operator not getting upgraded\nto newer version. Hence this commit renders newer IPsec daemonsets for\nintermediate period. When MCPs are moved to unpaused state and IPsec machine\nconfigs are installed on it, then it goes ahead with rendering only host\nflavored IPsec daemonset.\n\nSigned-off-by: Periyasamy Palanisamy ","shortMessageHtmlLink":"Move to use newer IPsec DaemonSets when MCP is in paused state"}},{"before":null,"after":"f98c120b3e5feb058f94890eb0466db4fcf283e6","ref":"refs/heads/mcp-pause-ipsec-4.16","pushedAt":"2024-08-01T07:34:21.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"pperiyasamy","name":"Periyasamy Palanisamy","path":"/pperiyasamy","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/30619230?s=80&v=4"},"commit":{"message":"Move to use newer IPsec DaemonSets when MCP is in paused state\n\nWhen MCP is in paused state, network operator continues to render older\nIPsec daemonsets which blocks network cluster operator not getting upgraded\nto newer version. Hence this commit renders newer IPsec daemonsets for\nintermediate period. When MCPs are moved to unpaused state and IPsec machine\nconfigs are installed on it, then it goes ahead with rendering only host\nflavored IPsec daemonset.\n\nSigned-off-by: Periyasamy Palanisamy ","shortMessageHtmlLink":"Move to use newer IPsec DaemonSets when MCP is in paused state"}},{"before":"dc0ef57c8512a150435226f5774a0f2263b0080b","after":"739536971534310704707375a4903858d7331ad3","ref":"refs/heads/release-4.16","pushedAt":"2024-08-01T06:53:51.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"pperiyasamy","name":"Periyasamy Palanisamy","path":"/pperiyasamy","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/30619230?s=80&v=4"},"commit":{"message":"Merge pull request #2445 from openshift-cherrypick-robot/cherry-pick-2406-to-release-4.16\n\n[release-4.16] OCPBUGS-37362: Fix IC distributed control plane alerts","shortMessageHtmlLink":"Merge pull request openshift#2445 from openshift-cherrypick-robot/che…"}},{"before":"7c6b3ce1f5adfefa91ffbae4108898770ebc6de5","after":"29843fac24b92f8916977aefda78e3af2c0e32d0","ref":"refs/heads/debug-mcp-pause-ipsec-blocking-upgrade","pushedAt":"2024-07-31T06:50:47.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"pperiyasamy","name":"Periyasamy Palanisamy","path":"/pperiyasamy","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/30619230?s=80&v=4"},"commit":{"message":"Move to use newer IPsec DaemonSets when MCP is in paused state\n\nWhen MCP is in paused state, network operator continues to render older\nIPsec daemonsets which blocks network cluster operator not getting upgraded\nto newer version. Hence this commit renders newer IPsec daemonsets for\nintermediate period. When MCPs are moved to unpaused state and IPsec machine\nconfigs are installed on it, then it goes ahead with rendering only host\nflavored IPsec daemonset.\n\nSigned-off-by: Periyasamy Palanisamy ","shortMessageHtmlLink":"Move to use newer IPsec DaemonSets when MCP is in paused state"}},{"before":"8b47946e23110c4887c98fff460e978b292989e5","after":"b454d8d06272bc4788c0b51bbf6970f6021b1dbb","ref":"refs/heads/master","pushedAt":"2024-07-31T02:10:15.000Z","pushType":"push","commitsCount":47,"pusher":{"login":"pperiyasamy","name":"Periyasamy Palanisamy","path":"/pperiyasamy","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/30619230?s=80&v=4"},"commit":{"message":"Merge pull request #2441 from davidvossel/hcp-tolerations\n\nCNV-43973: HCP custom tolerations integration","shortMessageHtmlLink":"Merge pull request openshift#2441 from davidvossel/hcp-tolerations"}},{"before":null,"after":"dc0ef57c8512a150435226f5774a0f2263b0080b","ref":"refs/heads/release-4.16","pushedAt":"2024-07-30T05:17:53.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"pperiyasamy","name":"Periyasamy Palanisamy","path":"/pperiyasamy","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/30619230?s=80&v=4"},"commit":{"message":"Merge pull request #2417 from openshift-cherrypick-robot/cherry-pick-2335-to-release-4.16\n\n[release-4.16] OCPBUGS-35836: Propogate hypershift control plane priority class override to multus and preserve container resource requests","shortMessageHtmlLink":"Merge pull request openshift#2417 from openshift-cherrypick-robot/che…"}},{"before":"0f7e17d1ed57d639278523185b2aed82038c7d7f","after":"00057484c2da00026844b76d1e6a7d414664bfc7","ref":"refs/heads/debug-ipsec","pushedAt":"2024-07-29T14:36:14.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"pperiyasamy","name":"Periyasamy Palanisamy","path":"/pperiyasamy","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/30619230?s=80&v=4"},"commit":{"message":"Collect pluto logs in debug mode and set conn narrowing=yes\n\nAs requested by @ueno, may help to troubleshoot libreswan for the bug OCPBUGS-22185.\n\nSigned-off-by: Periyasamy Palanisamy ","shortMessageHtmlLink":"Collect pluto logs in debug mode and set conn narrowing=yes"}},{"before":"91adf55e4c55d9cc5bef8fa73dd781e85c9f0d75","after":"0f7e17d1ed57d639278523185b2aed82038c7d7f","ref":"refs/heads/debug-ipsec","pushedAt":"2024-07-29T12:03:10.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"pperiyasamy","name":"Periyasamy Palanisamy","path":"/pperiyasamy","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/30619230?s=80&v=4"},"commit":{"message":"Collect pluto logs in debug mode and set conn narrowing=yes\n\nAs requested by @ueno, may help to troubleshoot libreswan for the bug OCPBUGS-22185.\n\nSigned-off-by: Periyasamy Palanisamy ","shortMessageHtmlLink":"Collect pluto logs in debug mode and set conn narrowing=yes"}},{"before":null,"after":"7c6b3ce1f5adfefa91ffbae4108898770ebc6de5","ref":"refs/heads/debug-mcp-pause-ipsec-blocking-upgrade","pushedAt":"2024-07-26T08:13:50.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"pperiyasamy","name":"Periyasamy Palanisamy","path":"/pperiyasamy","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/30619230?s=80&v=4"},"commit":{"message":"Debug blocking ipsec upgrade due to mcp pause\n\nWe noticied network operator goes ahead with deploying newer ipsec dameon\nthough some of the custom machine config pools are in paused state (which\nmeans IPsec machine configs are not deployed on those pool nodes yet).\nmachine config pool label selectors and processing of these labels in cno\nseem to be okay, so need to find out which causes cno to continue with\nrendering newer ipsec daemon set and it fails on these pool nodes because\nipsec packages are not installed, hence networks co goes into progressing\nstate.\n\nSigned-off-by: Periyasamy Palanisamy ","shortMessageHtmlLink":"Debug blocking ipsec upgrade due to mcp pause"}},{"before":"038cbcf9b1a02804b4fae81aa48f592419d319f8","after":"6d9f739ffab69717b0ffee2bfb97d99118cc88a4","ref":"refs/heads/release-4.15","pushedAt":"2024-07-26T06:26:34.000Z","pushType":"push","commitsCount":37,"pusher":{"login":"pperiyasamy","name":"Periyasamy Palanisamy","path":"/pperiyasamy","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/30619230?s=80&v=4"},"commit":{"message":"Merge pull request #2439 from yuvalk/ipsec-mcp-pools-415\n\nOCPBUGS-37205: Check every MachineConfigPool for IPsec plugin existence","shortMessageHtmlLink":"Merge pull request openshift#2439 from yuvalk/ipsec-mcp-pools-415"}},{"before":null,"after":"91adf55e4c55d9cc5bef8fa73dd781e85c9f0d75","ref":"refs/heads/debug-ipsec","pushedAt":"2024-06-05T11:23:25.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"pperiyasamy","name":"Periyasamy Palanisamy","path":"/pperiyasamy","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/30619230?s=80&v=4"},"commit":{"message":"Collect pluto logs in debug mode\n\nAs requested by @ueno, may help to troubleshoot libreswan for the bug OCPBUGS-22185.\n\nSigned-off-by: Periyasamy Palanisamy ","shortMessageHtmlLink":"Collect pluto logs in debug mode"}},{"before":"97fbd85539042b9e0f97f3d5f04e9764d0b8b489","after":"8b47946e23110c4887c98fff460e978b292989e5","ref":"refs/heads/master","pushedAt":"2024-06-05T11:18:09.000Z","pushType":"push","commitsCount":10,"pusher":{"login":"pperiyasamy","name":"Periyasamy Palanisamy","path":"/pperiyasamy","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/30619230?s=80&v=4"},"commit":{"message":"Merge pull request #2347 from tssurya/anp-metrics\n\nSDN-3817,MON-3795: Add ANP metric rule expressions for telemetry exposure","shortMessageHtmlLink":"Merge pull request openshift#2347 from tssurya/anp-metrics"}},{"before":"6f6b79bb994a5f38b8fc25edcd43b42229b3b70a","after":"257435702312e418be694f4b98b8fe89557030c6","ref":"refs/heads/release-4.13","pushedAt":"2024-05-29T14:57:49.000Z","pushType":"push","commitsCount":55,"pusher":{"login":"pperiyasamy","name":"Periyasamy Palanisamy","path":"/pperiyasamy","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/30619230?s=80&v=4"},"commit":{"message":"Merge pull request #2290 from yuvalk/release-4.13\n\nOCPBUGS-30150: ipsec: fix openssl typo","shortMessageHtmlLink":"Merge pull request openshift#2290 from yuvalk/release-4.13"}},{"before":"d429c8bc14a64bd56fb9160b218bfa75a891219f","after":"796bf8f5d5268e1123f033a644b7c7abf3bec823","ref":"refs/heads/release-4.14","pushedAt":"2024-05-29T14:37:25.000Z","pushType":"push","commitsCount":7,"pusher":{"login":"pperiyasamy","name":"Periyasamy Palanisamy","path":"/pperiyasamy","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/30619230?s=80&v=4"},"commit":{"message":"Merge pull request #2207 from ricky-rav/OCPBUGS-26577_4.14\n\nOCPBUGS-27925,OCPBUGS-30579:[release-4.14] tighten conditions for the state transitions in IC upgrade","shortMessageHtmlLink":"Merge pull request openshift#2207 from ricky-rav/OCPBUGS-26577_4.14"}},{"before":"04be42f85cedc1ee74de0e0bbf8c92250a123168","after":"352204038905f1cac6ba84b0709163d3d73e5ae3","ref":"refs/heads/mcp-watcher","pushedAt":"2024-05-27T16:20:02.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"pperiyasamy","name":"Periyasamy Palanisamy","path":"/pperiyasamy","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/30619230?s=80&v=4"},"commit":{"message":"Add machine config watcher for status manager\n\nThis enhances status manager to watch for machine config and machine\nconfig pool objects, retrieves machine config pool status when ipsec\nis enabled and when any one of the machine config pool goes into\ndegraded state, then makes network operator also into degraded state.\n\nSigned-off-by: Periyasamy Palanisamy ","shortMessageHtmlLink":"Add machine config watcher for status manager"}},{"before":"b75108d543312d95bbfbc59bc40508251c9cbcc8","after":"04be42f85cedc1ee74de0e0bbf8c92250a123168","ref":"refs/heads/mcp-watcher","pushedAt":"2024-05-27T13:10:37.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"pperiyasamy","name":"Periyasamy Palanisamy","path":"/pperiyasamy","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/30619230?s=80&v=4"},"commit":{"message":"Add machine config watcher for status manager\n\nThis enhances status manager to watch for machine config and machine\nconfig pool objects, retrieves machine config pool status when ipsec\nis enabled and when any one of the machine config pool goes into\ndegraded state, then makes network operator also into degraded state.\n\nSigned-off-by: Periyasamy Palanisamy ","shortMessageHtmlLink":"Add machine config watcher for status manager"}},{"before":"74114307a1b61df6d5ef55f6377ec20385b1fdb3","after":"b75108d543312d95bbfbc59bc40508251c9cbcc8","ref":"refs/heads/mcp-watcher","pushedAt":"2024-05-23T17:04:22.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"pperiyasamy","name":"Periyasamy Palanisamy","path":"/pperiyasamy","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/30619230?s=80&v=4"},"commit":{"message":"Add machine config pool watcher for status manager\n\nThis enhances status manager to watch for machine config pool object,\nretrieves machine config pool status when ipsec is enabled and when\nany one of the machine config pool goes into degraded state, then\nmakes network operator also into degraded state.\n\nSigned-off-by: Periyasamy Palanisamy ","shortMessageHtmlLink":"Add machine config pool watcher for status manager"}},{"before":null,"after":"74114307a1b61df6d5ef55f6377ec20385b1fdb3","ref":"refs/heads/mcp-watcher","pushedAt":"2024-05-23T17:01:28.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"pperiyasamy","name":"Periyasamy Palanisamy","path":"/pperiyasamy","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/30619230?s=80&v=4"},"commit":{"message":"Add machine config pool watcher for status manager\n\nThis enhances status manager to watch for machine config pool object,\nretrieves machine config pool status when ipsec is enabled and when\nany one of the machine config pool goes into degraded state, then\nmakes network operator also into degraded state.\n\nSigned-off-by: Periyasamy Palanisamy ","shortMessageHtmlLink":"Add machine config pool watcher for status manager"}},{"before":"0a03896c62248aa3946fc95ff387ee0a4f3922d5","after":"97fbd85539042b9e0f97f3d5f04e9764d0b8b489","ref":"refs/heads/master","pushedAt":"2024-05-23T11:51:42.000Z","pushType":"push","commitsCount":10,"pusher":{"login":"pperiyasamy","name":"Periyasamy Palanisamy","path":"/pperiyasamy","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/30619230?s=80&v=4"},"commit":{"message":"Merge pull request #2367 from pliurh/np-975\n\nNP-975: Align new node subnet allocation between OVN-K and SDN during live migration","shortMessageHtmlLink":"Merge pull request openshift#2367 from pliurh/np-975"}},{"before":"05e8f365b75f4d8f19718374570d070e408e8bbe","after":"dbebf6ca5ba77e3a853e8220522e2c857ba8be72","ref":"refs/heads/remove-ipsec-state","pushedAt":"2024-05-21T13:23:36.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"pperiyasamy","name":"Periyasamy Palanisamy","path":"/pperiyasamy","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/30619230?s=80&v=4"},"commit":{"message":"Remove ip xfrm state when IPsec is disabled\n\nThe ovn-ipsec-host daemonset doesn't remove ipsec state when IPsec for\neast west traffic is disabled. This might still keep running data plane\ntraffic with ipsec encrypted. Hence this commit cleans up ipsec state\nso that east west traffic restored with only geneve header.\n\nSigned-off-by: Periyasamy Palanisamy ","shortMessageHtmlLink":"Remove ip xfrm state when IPsec is disabled"}},{"before":"f1585cfeb0c11e28712f8327c811a104a8c7c0f4","after":"05e8f365b75f4d8f19718374570d070e408e8bbe","ref":"refs/heads/remove-ipsec-state","pushedAt":"2024-05-17T16:14:53.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"pperiyasamy","name":"Periyasamy Palanisamy","path":"/pperiyasamy","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/30619230?s=80&v=4"},"commit":{"message":"Remove ip xfrm state when IPsec is disabled\n\nThe ovn-ipsec-host daemonset doesn't remove ipsec state when IPsec for\neast west traffic is disabled. This might still keep running data plane\ntraffic with ipsec encrypted. Hence this commit cleans up ipsec state\nso that east west traffic restored with only geneve header.\n\nSigned-off-by: Periyasamy Palanisamy ","shortMessageHtmlLink":"Remove ip xfrm state when IPsec is disabled"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAEoDqh2gA","startCursor":null,"endCursor":null}},"title":"Activity · pperiyasamy/cluster-network-operator"}