Ce contenu n'est pas disponible dans la langue sélectionnée.
Chapter 5. BGP routing
5.1. About BGP routing Copier lienLien copié sur presse-papiers!
This feature provides native Border Gateway Protocol (BGP) routing capabilities for the cluster.
If you are using the MetalLB Operator and there are existing FRRConfiguration
CRs in the metallb-system
namespace created by cluster administrators or third-party cluster components other than the MetalLB Operator, you must ensure that they are copied to the openshift-frr-k8s
namespace or that those third-party cluster components use the new namespace. For more information, see Migrating FRR-K8s resources.
5.1.1. About Border Gateway Protocol (BGP) routing Copier lienLien copié sur presse-papiers!
OpenShift Container Platform supports BGP routing through FRRouting (FRR), a free, open source internet routing protocol suite for Linux, UNIX, and similar operating systems. FRR-K8s is a Kubernetes-based daemon set that exposes a subset of the FRR API in a Kubernetes-compliant manner. As a cluster administrator, you can use the FRRConfiguration
custom resource (CR) to access FRR services.
5.1.1.1. Supported platforms Copier lienLien copié sur presse-papiers!
BGP routing is supported on the following infrastructure types:
- Bare metal
BGP routing requires that you have properly configured BGP for your network provider. Outages or misconfigurations of your network provider might cause disruptions to your cluster network.
5.1.1.2. Considerations for use with the MetalLB Operator Copier lienLien copié sur presse-papiers!
The MetalLB Operator is installed as an add-on to the cluster. Deployment of the MetalLB Operator automatically enables FRR-K8s as an additional routing capability provider and uses the FRR-K8s daemon installed by this feature.
Before upgrading to 4.18, any existing FRRConfiguration
in the metallb-system
namespace not managed by the MetalLB operator (added by a cluster administrator or any other component) needs to be copied to the openshift-frr-k8s
namespace manually, creating the namespace if necessary.
If you are using the MetalLB Operator and there are existing FRRConfiguration
CRs in the metallb-system
namespace created by cluster administrators or third-party cluster components other than MetalLB Operator, you must:
-
Ensure that these existing
FRRConfiguration
CRs are copied to theopenshift-frr-k8s
namespace. -
Ensure that the third-party cluster components use the new namespace for the
FRRConfiguration
CRs that they create.
5.1.1.3. Cluster Network Operator configuration Copier lienLien copié sur presse-papiers!
The Cluster Network Operator API exposes the following API field to configure BGP routing:
-
spec.additionalRoutingCapabilities
: Enables deployment of the FRR-K8s daemon for the cluster, which can be used independently of route advertisements. When enabled, the FRR-K8s daemon is deployed on all nodes.
5.1.1.4. BGP routing custom resources Copier lienLien copié sur presse-papiers!
The following custom resources are used to configure BGP routing:
FRRConfiguration
- This custom resource defines the FRR configuration for the BGP routing. This CR is namespaced.
5.1.2. Configuring the FRRConfiguration CRD Copier lienLien copié sur presse-papiers!
The following section provides reference examples that use the FRRConfiguration
custom resource (CR).
5.1.2.1. The routers field Copier lienLien copié sur presse-papiers!
You can use the routers
field to configure multiple routers, one for each Virtual Routing and Forwarding (VRF) resource. For each router, you must define the Autonomous System Number (ASN).
You can also define a list of Border Gateway Protocol (BGP) neighbors to connect to, as in the following example:
Example FRRConfiguration CR
5.1.2.2. The toAdvertise field Copier lienLien copié sur presse-papiers!
By default, FRR-K8s
does not advertise the prefixes configured as part of a router configuration. In order to advertise them, you use the toAdvertise
field.
You can advertise a subset of the prefixes, as in the following example:
Example FRRConfiguration CR
- 1
- Advertises a subset of prefixes.
The following example shows you how to advertise all of the prefixes:
Example FRRConfiguration CR
- 1
- Advertises all prefixes.
5.1.2.3. The toReceive field Copier lienLien copié sur presse-papiers!
By default, FRR-K8s
does not process any prefixes advertised by a neighbor. You can use the toReceive
field to process such addresses.
You can configure for a subset of the prefixes, as in this example:
Example FRRConfiguration CR
The following example configures FRR to handle all the prefixes announced:
Example FRRConfiguration CR
5.1.2.4. The bgp field Copier lienLien copié sur presse-papiers!
You can use the bgp
field to define various BFD
profiles and associate them with a neighbor. In the following example, BFD
backs up the BGP
session and FRR
can detect link failures:
Example FRRConfiguration CR
5.1.2.5. The nodeSelector field Copier lienLien copié sur presse-papiers!
By default, FRR-K8s
applies the configuration to all nodes where the daemon is running. You can use the nodeSelector
field to specify the nodes to which you want to apply the configuration. For example:
Example FRRConfiguration CR
5.1.2.6. The interface field Copier lienLien copié sur presse-papiers!
The spec.bgp.routers.neighbors.interface
field is a Technology Preview feature only. Technology Preview features are not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete. Red Hat does not recommend using them in production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process.
For more information about the support scope of Red Hat Technology Preview features, see Technology Preview Features Support Scope.
You can use the interface
field to configure unnumbered BGP peering by using the following example configuration:
Example FRRConfiguration
CR
- 1
- Activates unnumbered BGP peering.
To use the interface
field, you must establish a point-to-point, layer 2 connection between the two BGP peers. You can use unnumbered BGP peering with IPv4, IPv6, or dual-stack, but you must enable IPv6 RAs (Router Advertisements). Each interface is limited to one BGP connection.
If you use this field, you cannot specify a value in the spec.bgp.routers.neighbors.address
field.
The fields for the FRRConfiguration
custom resource are described in the following table:
Field | Type | Description |
---|---|---|
|
| Specifies the routers that FRR is to configure (one per VRF). |
|
| The Autonomous System Number (ASN) to use for the local end of the session. |
|
|
Specifies the ID of the |
|
| Specifies the host vrf used to establish sessions from this router. |
|
| Specifies the neighbors to establish BGP sessions with. |
|
|
Specifies the ASN to use for the remote end of the session. If you use this field, you cannot specify a value in the |
|
|
Detects the ASN to use for the remote end of the session without explicitly setting it. Specify |
|
|
Specifies the IP address to establish the session with. If you use this field, you cannot specify a value in the |
|
|
Specifies the interface name to use when establishing a session. Use this field to configure unnumbered BGP peering. There must be a point-to-point, layer 2 connection between the two BGP peers. You can use unnumbered BGP peering with IPv4, IPv6, or dual-stack, but you must enable IPv6 RAs (Router Advertisements). Each interface is limited to one BGP connection. The |
|
| Specifies the port to dial when establishing the session. Defaults to 179. |
|
|
Specifies the password to use for establishing the BGP session. |
|
|
Specifies the name of the authentication secret for the neighbor. The secret must be of type "kubernetes.io/basic-auth", and in the same namespace as the FRR-K8s daemon. The key "password" stores the password in the secret. |
|
| Specifies the requested BGP hold time, per RFC4271. Defaults to 180s. |
|
|
Specifies the requested BGP keepalive time, per RFC4271. Defaults to |
|
| Specifies how long BGP waits between connection attempts to a neighbor. |
|
| Indicates if the BGPPeer is multi-hops away. |
|
| Specifies the name of the BFD Profile to use for the BFD session associated with the BGP session. If not set, the BFD session is not set up. |
|
| Represents the list of prefixes to advertise to a neighbor, and the associated properties. |
|
| Specifies the list of prefixes to advertise to a neighbor. This list must match the prefixes that you define in the router. |
|
|
Specifies the mode to use when handling the prefixes. You can set to |
|
| Specifies the prefixes associated with an advertised local preference. You must specify the prefixes associated with a local preference in the prefixes allowed to be advertised. |
|
| Specifies the prefixes associated with the local preference. |
|
| Specifies the local preference associated with the prefixes. |
|
| Specifies the prefixes associated with an advertised BGP community. You must include the prefixes associated with a local preference in the list of prefixes that you want to advertise. |
|
| Specifies the prefixes associated with the community. |
|
| Specifies the community associated with the prefixes. |
|
| Specifies the prefixes to receive from a neighbor. |
|
| Specifies the information that you want to receive from a neighbor. |
|
| Specifies the prefixes allowed from a neighbor. |
|
|
Specifies the mode to use when handling the prefixes. When set to |
|
| Disables MP BGP to prevent it from separating IPv4 and IPv6 route exchanges into distinct BGP sessions. |
|
| Specifies all prefixes to advertise from this router instance. |
|
| Specifies the list of bfd profiles to use when configuring the neighbors. |
|
| The name of the BFD Profile to be referenced in other parts of the configuration. |
|
|
Specifies the minimum interval at which this system can receive control packets, in milliseconds. Defaults to |
|
|
Specifies the minimum transmission interval, excluding jitter, that this system wants to use to send BFD control packets, in milliseconds. Defaults to |
|
| Configures the detection multiplier to determine packet loss. To determine the connection loss-detection timer, multiply the remote transmission interval by this value. |
|
|
Configures the minimal echo receive transmission-interval that this system can handle, in milliseconds. Defaults to |
|
| Enables or disables the echo transmission mode. This mode is disabled by default, and not supported on multihop setups. |
|
| Mark session as passive. A passive session does not attempt to start the connection and waits for control packets from peers before it begins replying. |
|
| For multihop sessions only. Configures the minimum expected TTL for an incoming BFD control packet. |
|
| Limits the nodes that attempt to apply this configuration. If specified, only those nodes whose labels match the specified selectors attempt to apply the configuration. If it is not specified, all nodes attempt to apply this configuration. |
|
| Defines the observed state of FRRConfiguration. |
5.2. Enabling BGP routing Copier lienLien copié sur presse-papiers!
As a cluster administrator, you can enable OVN-Kubernetes Border Gateway Protocol (BGP) routing support for your cluster.
5.2.1. Enabling Border Gateway Protocol (BGP) routing Copier lienLien copié sur presse-papiers!
As a cluster administrator, you can enable Border Gateway Protocol (BGP) routing support for your cluster on bare-metal infrastructure.
If you are using BGP routing in conjunction with the MetalLB Operator, the necessary BGP routing support is enabled automatically. You do not need to manually enable BGP routing support.
5.2.1.1. Enabling BGP routing support Copier lienLien copié sur presse-papiers!
As a cluster administrator, you can enable BGP routing support for your cluster.
Prerequisites
-
You have installed the OpenShift CLI (
oc
). -
You are logged in to the cluster as a user with the
cluster-admin
role. - The cluster is installed on compatible infrastructure.
Procedure
To enable a dynamic routing provider, enter the following command:
oc patch network.operator cluster -p '{
$ oc patch network.operator cluster -p '{ "spec": { "additionalRoutingCapabilities": ["FRR"] } }'
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
5.3. Disabling BGP routing Copier lienLien copié sur presse-papiers!
As a cluster administrator, you can enable OVN-Kubernetes Border Gateway Protocol (BGP) routing support for your cluster.
5.3.1. Disabling Border Gateway Protocol (BGP) routing Copier lienLien copié sur presse-papiers!
As a cluster administrator, you can disable Border Gateway Protocol (BGP) routing support for your cluster on bare-metal infrastructure.
5.3.1.1. Enabling BGP routing support Copier lienLien copié sur presse-papiers!
As a cluster administrator, you can disable BGP routing support for your cluster.
Prerequisites
-
You have installed the OpenShift CLI (
oc
). -
You are logged in to the cluster as a user with the
cluster-admin
role. - The cluster is installed on compatible infrastructure.
Procedure
To disable dynamic routing, enter the following command:
oc patch network.operator cluster -p '{
$ oc patch network.operator cluster -p '{ "spec": { "additionalRoutingCapabilities": null } }'
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
5.4. Migrating FRR-K8s resources Copier lienLien copié sur presse-papiers!
All user-created FRR-K8s custom resources (CRs) in the metallb-system
namespace under OpenShift Container Platform 4.17 and earlier releases must be migrated to the openshift-frr-k8s
namespace. As a cluster administrator, complete the steps in this procedure to migrate your FRR-K8s custom resources.
5.4.1. Migrating FRR-K8s resources Copier lienLien copié sur presse-papiers!
You can migrate the FRR-K8s FRRConfiguration
custom resources from the metallb-system
namespace to the openshift-frr-k8s
namespace.
Prerequisites
-
You have installed the OpenShift CLI (
oc
). -
You are logged in to the cluster as a user with the
cluster-admin
role.
Procedure
When upgrading from an earlier version of OpenShift Container Platform with the Metal LB Operator deployed, you must manually migrate your custom FRRConfiguration
configurations from the metallb-system
namespace to the openshift-frr-k8s
namespace. To move these CRs, enter the following commands:
To create the
openshift-frr-k8s
namespace, enter the following command:oc create namespace openshift-frr-k8s
$ oc create namespace openshift-frr-k8s
Copy to Clipboard Copied! Toggle word wrap Toggle overflow To automate the migration, create a shell script named
migrate.sh
with the following contents:Copy to Clipboard Copied! Toggle word wrap Toggle overflow To execute the migration, run the following command:
bash migrate.sh
$ bash migrate.sh
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Verification
To confirm that the migration succeeded, run the following command:
oc get frrconfigurations.frrk8s.metallb.io -n openshift-frr-k8s
$ oc get frrconfigurations.frrk8s.metallb.io -n openshift-frr-k8s
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
After the migration is complete, you can remove the FRRConfiguration
custom resources from the metallb-system
namespace.