-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow live-migration for pod network in bridge mode #7768
Conversation
Hi @kvaps. Thanks for your PR. I'm waiting for a kubevirt member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Some initial comments.
Let's check out your new e2e test
/test pull-kubevirt-e2e-k8s-1.21-sig-network
Some more questions:
|
I tested this with
Yeah, both scenarios are supported:
Both are done by setting link down / link up to force DHCP-client renew a lease. I tested this with cilium/cilium#19789 |
@kvaps , this is a very interesting proposal. I think it will very useful to push this idea forward through a formal proposal. I am interested to see the use cases where such an option fits better than the existing masquerade, a discussion on when and how to enable migrations in such setups and the technical details of how such a migration will work from the pod, vm and guest perspective. At the last point regarding the tech details, I remember the challenge of having the mac address at the source and target pods active for the migration period. Generally speaking, if this can fit a specific configuration (e.g. specific CNI, guests with/without dhcp, acceptable link-flickering on the vnic, etc), I see no reason why not to have it in as an option. The main risk and limitation is that future features/changes may break it (i.e. if activating a future enhancement will break this migration option, it may still be accepted in and you will not be able to use it). I hope this can be discussed through a proposal. |
/sig network |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Some code related nits, and requests for unit / e2e tests.
I agree with @EdDev - this would move forward faster if you presented a design proposal of this work.
@kvaps thanks for the PR. I agree with Miguel and Eddy that it would be much easier to continue the discussion over a proposal.
It would be nice to explain why unlinking/linking the interface is better than one of those options. Another question I would love to discuss over the proposal-
|
Sorry for long answer
This is not working in every distribution, IIRC some old ubuntu and debians setting IP lifetime for infinity despite the fact DHCP provided lease just from shot amount of time.
This is still RFC and is not supported on some distributions and MS Windows for example The link down/up method works perfectly in both cases
Well, we can force renewing IP configuration for the VM (this is not only about the IP address, but also routes). However I was also thinking about this, and I think we have two options:
I think detaching link for working virtual machine can be destructive action if application is binded on specific interface, not just |
723e19e
to
cdbd9d9
Compare
1a161d3
to
d8fdb00
Compare
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
@kvaps: The following tests failed, say
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with /lifecycle stale |
/remove-lifecycle stale |
I migrated my fork from |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with /lifecycle stale |
Still wanted |
/remove-lifecycle stale |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Never mind I see the problem
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with /lifecycle stale |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with /lifecycle rotten |
I am interested in this feature /remove-lifecycle stale |
Rotten issues close after 30d of inactivity. /close |
@kubevirt-bot: Closed this PR. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
This PR enables the live-migration feaure for pod networking in any mode.
The feature protected by feature gate
NetworkAwareLiveMigration
The functionality has been added:
Full proposal is described here kubevirt/community#182
fixes #7238
What this PR does / why we need it:
This feature would allow to live-migrate the VMs with pod network in bridge and macvtap modes.
We're at Deckhouse developing virtualization solution based on KubeVirt and Cilium.
We'd like to make live-migration working for less latency modes (macvtap and bridge)
Which issue(s) this PR fixes
Special notes for your reviewer:
Slack thread: https://kubernetes.slack.com/archives/C8ED7RKFE/p1652296916563589?thread_ts=1650371688.593359&cid=C8ED7RKFE
Release note: