-
Egress firewall is also known as egress network policy in OpenShift SDN. This is not the same as network policy egress.
-
Does not support egress rules and some
ipBlock
rules.
OKD uses a software-defined networking (SDN) approach to provide a unified cluster network that enables communication between pods across the OKD cluster. This pod network is established and maintained by the OpenShift SDN, which configures an overlay network using Open vSwitch (OVS).
OpenShift SDN provides three SDN modes for configuring the pod network:
Network policy mode allows project administrators to configure their own
isolation policies using NetworkPolicy
objects. Network policy is the default mode in OKD 4.6.
Multitenant mode provides project-level isolation for pods and services. Pods from different projects cannot send packets to or receive packets from pods and services of a different project. You can disable isolation for a project, allowing it to send network traffic to all pods and services in the entire cluster and receive network traffic from those pods and services.
Subnet mode provides a flat pod network where every pod can communicate with every other pod and service. The network policy mode provides the same functionality as subnet mode.
OKD uses the OVN-Kubernetes Container Network Interface (CNI) plug-in by default. |
OKD offers two supported choices, OpenShift SDN and OVN-Kubernetes, for the default Container Network Interface (CNI) network provider. The following table summarizes the current feature support for both network providers:
Feature | OpenShift SDN | OVN-Kubernetes |
---|---|---|
Egress IPs |
Supported |
Supported |
Egress firewall [1] |
Supported |
Supported |
Egress router |
Supported |
Not supported |
Kubernetes network policy |
Partially supported [2] |
Supported |
Multicast |
Supported |
Supported |
Egress firewall is also known as egress network policy in OpenShift SDN. This is not the same as network policy egress.
Does not support egress rules and some ipBlock
rules.