-
During debugging the e2e test "ingress traffic validation: Should be allowed by externalip services" we saw, that the test is failing in IPv6 mode, no SNAT and shared GW mode due to a `connection rese…
-
Hi,
There is a possible corner case when the controller has just started and link_up events may end up making the EVCs to be (re)deployed. See the log messages below to a possible example of such s…
-
**Describe what you are trying to solve**
https://github.com/antrea-io/antrea/issues/4213 asked for the ability to apply NetworkPolicies to not only Pods but also Kubernetes Nodes. Antrea currently…
tnqn updated
9 months ago
-
Hello, and thank you for taking the time to read my post.
> Context:
A very recent Arch Linux installation (less than a week old);
Access to Arch Linux packages via pacman, stable and functional;…
-
With a TCP packet such as: `192.168.205.135.53 > 192.168.1.106.6653`
The protocol selected and decoded by tcpdump is OpenFlow (OPENFLOW_PORT_IANA == 6653) and not DNS.
In the `if...else if...` tes…
-
**Describe the bug**
I have two pod: antrea-octant and nginx. I would like to traceflow packet from antrea-octant to nginx using tcp protocol.
```
root@slave1:antrea# kubectl get nodes
NAME ST…
-
Currently (`2022.3`), we've been storing `active` southbound protocol state from `Interface`, `Switch` and `Links` on `switches` and `links` collections. However, this isn't actually necessary since t…
-
> followup from https://www.reddit.com/r/RARE_freeRtr/comments/16vnync/explanation_needed_p4lang_export_of_bridges_and/
> the issue is that if i try it with the p4lang, not all routers are created …
mc36 updated
7 months ago
-
**Describe the problem/challenge you have**
Antrea NetworkPolicy and ClusterNetworkPolicy allows to turn on firewall rule log. The first packet in a connection which hits the rule will generate log m…
-
Hi,
The Napp `kytos-ng/of_lldp` generates LLDP packets with an invalid source MAC address, as shown in this ofp_sniffer capture:
```
Packet #396 - 2023-06-27 19:01:00.437820 x.x.x.x:6653 -> x.x…