You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/nw-ovn-ipsec-north-south-enable.adoc
+25-17Lines changed: 25 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,8 +18,8 @@ After you apply the machine config, the Machine Config Operator reboots affected
18
18
* Install the {oc-first}.
19
19
* You have installed the `butane` utility on your local computer.
20
20
* You have installed the NMState Operator on the cluster.
21
-
* You are logged in to the cluster as a user with `cluster-admin` privileges.
22
-
* You have an existing PKCS#12 certificate for the IPsec endpoint and a CA cert in PEM format.
21
+
* You logged in to the cluster as a user with `cluster-admin` privileges.
22
+
* You have an existing PKCS#12 certificate for the IPsec endpoint and a CA cert in Privacy Enhanced Mail (PEM) format.
23
23
* You enabled IPsec in either `Full` or `External` mode on your cluster.
24
24
* The OVN-Kubernetes network plugin must be configured in local gateway mode, where `ovnKubernetesConfig.gatewayConfig.routingViaHost=true`.
25
25
@@ -33,7 +33,7 @@ After you apply the machine config, the Machine Config Operator reboots affected
33
33
$ oc get nodes
34
34
----
35
35
36
-
.. Create a file named `ipsec-config.yaml` that contains a node network configuration policy for the NMState Operator, such as in the following examples. For an overview about `NodeNetworkConfigurationPolicy` objects, see link:https://nmstate.io/kubernetes-nmstate/[The Kubernetes NMState project].
36
+
.. Create a file named `ipsec-config.yaml` that has a node network configuration policy for the NMState Operator, such as in the following examples. For an overview about `NodeNetworkConfigurationPolicy` objects, see link:https://nmstate.io/kubernetes-nmstate/[The Kubernetes NMState project].
37
37
+
38
38
--
39
39
.Example NMState IPsec transport configuration
@@ -63,10 +63,10 @@ spec:
63
63
ikev2: insist
64
64
type: transport
65
65
----
66
-
<1> Specifies the host name to apply the policy to. This host serves as the left side host in the IPsec configuration.
66
+
<1> Specifies the hostname to apply the policy to. This host serves as the left side host in the IPsec configuration.
67
67
<2> Specifies the name of the interface to create on the host.
68
-
<3> Specifies the host name of the cluster node that terminates the IPsec tunnel on the cluster side. The name should match SAN `[Subject Alternate Name]` from your supplied PKCS#12 certificates.
69
-
<4> Specifies the external host name, such as `host.example.com`. The name should match the SAN `[Subject Alternate Name]` from your supplied PKCS#12 certificates.
68
+
<3> Specifies the hostname of the cluster node that terminates the IPsec tunnel on the cluster side. The name should match SAN `[Subject Alternate Name]` from your supplied PKCS#12 certificates.
69
+
<4> Specifies the external hostname, such as `host.example.com`. The name should match the Storage Area Network (SAN)`[Subject Alternate Name]` from your supplied PKCS#12 certificates.
70
70
<5> Specifies the IP address of the external host, such as `10.1.2.3/32`.
71
71
72
72
.Example NMState IPsec tunnel configuration
@@ -96,10 +96,10 @@ spec:
96
96
ikev2: insist
97
97
type: tunnel
98
98
----
99
-
<1> Specifies the host name to apply the policy to. This host serves as the left side host in the IPsec configuration.
99
+
<1> Specifies the hostname to apply the policy to. This host serves as the left side host in the IPsec configuration.
100
100
<2> Specifies the name of the interface to create on the host.
101
-
<3> Specifies the host name of the cluster node that terminates the IPsec tunnel on the cluster side. The name should match SAN `[Subject Alternate Name]` from your supplied PKCS#12 certificates.
102
-
<4> Specifies the external host name, such as `host.example.com`. The name should match the SAN `[Subject Alternate Name]` from your supplied PKCS#12 certificates.
101
+
<3> Specifies the hostname of the cluster node that terminates the IPsec tunnel on the cluster side. The name should match SAN `[Subject Alternate Name]` from your supplied PKCS#12 certificates.
102
+
<4> Specifies the external hostname, such as `host.example.com`. The name should match the SAN `[Subject Alternate Name]` from your supplied PKCS#12 certificates.
103
103
<5> Specifies the IP address of the external host, such as `10.1.2.3/32`.
104
104
--
105
105
@@ -110,16 +110,23 @@ spec:
110
110
$ oc create -f ipsec-config.yaml
111
111
----
112
112
113
-
. Provide the following certificate files to add to the Network Security Services (NSS) database on each host. These files are imported as part of the Butane configuration in subsequent steps.
113
+
. Give the following certificate files to add to the Network Security Services (NSS) database on each host. These files are imported as part of the Butane configuration in the next steps.
114
114
+
115
115
--
116
116
* `left_server.p12`: The certificate bundle for the IPsec endpoints
117
117
* `ca.pem`: The certificate authority that you signed your certificates with
118
118
--
119
119
120
120
. Create a machine config to add your certificates to the cluster:
121
-
122
-
.. To create Butane config files for the control plane and worker nodes, enter the following command:
121
+
+
122
+
.. Use the `pk12util` tool, which comes prepackaged with {op-system-base-full}, to specify a password that protects `PKCS#12` files by entering the following command. Ensure that you replace the `<password>` value with your password.
0 commit comments