-
egress firewall is also known as egress network policy in OpenShift SDN. This is not the same as network policy egress.
-
Does not support egress rules and some
ipBlock
rules.
OpenShift Container Platform uses a software-defined networking (SDN) approach to provide a unified cluster network that enables communication between pods across the OpenShift Container Platform cluster. This pod network is established and maintained by the OpenShift SDN, which configures an overlay network using Open vSwitch (OVS).
OpenShift SDN provides three SDN modes for configuring the pod network:
Network policy mode allows project administrators to configure their own
isolation policies using NetworkPolicy
objects. Network policy is the default mode in OpenShift Container Platform 4.6.
Multitenant mode provides project-level isolation for pods and services. Pods from different projects cannot send packets to or receive packets from pods and services of a different project. You can disable isolation for a project, allowing it to send network traffic to all pods and services in the entire cluster and receive network traffic from those pods and services.
Subnet mode provides a flat pod network where every pod can communicate with every other pod and service. The network policy mode provides the same functionality as subnet mode.
OpenShift Container Platform offers two supported choices, OpenShift SDN and OVN-Kubernetes, for the default Container Network Interface (CNI) network provider. The following table summarizes the current feature support for both network providers:
Feature | OpenShift SDN | OVN-Kubernetes |
---|---|---|
egress IPs |
Supported |
Supported |
egress firewall [1] |
Supported |
Supported |
egress router |
Supported |
Not supported |
Kubernetes network policy |
Partially supported [2] |
Supported |
Multicast |
Supported |
Supported |
egress firewall is also known as egress network policy in OpenShift SDN. This is not the same as network policy egress.
Does not support egress rules and some ipBlock
rules.