This is a cache of https://docs.openshift.com/container-platform/4.9/networking/openshift_sdn/about-openshift-sdn.html. It is a snapshot of the page at 2024-11-22T18:22:47.990+0000.
About the OpenShift SDN default CNI network provider - OpenShift SDN default CNI network provider | Networking | OpenShift Container Platform 4.9
×

OpenShift Container Platform uses a software-defined networking (SDN) approach to provide a unified cluster network that enables communication between pods across the OpenShift Container Platform cluster. This pod network is established and maintained by the OpenShift SDN, which configures an overlay network using Open vSwitch (OVS).

OpenShift SDN network isolation modes

OpenShift SDN provides three SDN modes for configuring the pod network:

  • Network policy mode allows project administrators to configure their own isolation policies using NetworkPolicy objects. Network policy is the default mode in OpenShift Container Platform 4.9.

  • Multitenant mode provides project-level isolation for pods and services. Pods from different projects cannot send packets to or receive packets from pods and services of a different project. You can disable isolation for a project, allowing it to send network traffic to all pods and services in the entire cluster and receive network traffic from those pods and services.

  • Subnet mode provides a flat pod network where every pod can communicate with every other pod and service. The network policy mode provides the same functionality as subnet mode.

Supported default CNI network provider feature matrix

OpenShift Container Platform offers two supported choices, OpenShift SDN and OVN-Kubernetes, for the default Container Network Interface (CNI) network provider. The following table summarizes the current feature support for both network providers:

Table 1. Default CNI network provider feature comparison
Feature OpenShift SDN OVN-Kubernetes

egress IPs

Supported

Supported

egress firewall [1]

Supported

Supported

egress router

Supported

Supported [2]

IPsec encryption

Not supported

Supported

IPv6

Not supported

Supported [3]

Kubernetes network policy

Partially supported [4]

Supported

Kubernetes network policy logs

Not supported

Supported

Multicast

Supported

Supported

  1. egress firewall is also known as egress network policy in OpenShift SDN. This is not the same as network policy egress.

  2. egress router for OVN-Kubernetes supports only redirect mode.

  3. IPv6 is supported only on bare metal clusters.

  4. Network policy for OpenShift SDN does not support egress rules and some ipBlock rules.