-
Notifications
You must be signed in to change notification settings - Fork 806
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
bridge: read only required chain on cni del instead of the entire ruleset #880
bridge: read only required chain on cni del instead of the entire ruleset #880
Conversation
3c0cc97
to
c10c1cf
Compare
c10c1cf
to
8b86929
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you!
I had a small suggestion inline, let me know what you think.
Also, please consider using now ReadConfigContext
and pass it with a explicit timeout. We could do this in a following PR if you prefer.
BTW, go-nft 0.3.0 is released, so you can use it now.
This go-nft version allows its users to only read particular tables/chains when invoking `ReadConfig`, instead of the entire ruleset. This will make deleting rules from a large ruleset faster, thus speeding up CNI DELs. Fixes: https://bugzilla.redhat.com/show_bug.cgi?id=2175041 Signed-off-by: Miguel Duarte Barroso <[email protected]>
8b86929
to
6a3eb15
Compare
Signed-off-by: Miguel Duarte Barroso <[email protected]>
6a3eb15
to
f793e70
Compare
f793e70
to
ee90f39
Compare
Making sure the exec'ed nft command is executed in 55 secs allows for CNI to fail early, thus preventing CRI from sending another CNI DEL while the previous NFT call is still being processed. This fix prevents part of the behavior described in [0], in which: > cnv-bridge and nft comes pile up in a loop, increasing every 60, never completes The timeout had to be less than 60 seconds (otherwise CRI would still trigger CNI DEL again) but large enough for this feature to have a chance of working on older kernels (e.g. centOS 8), where it takes longer to access even a specific chain/table. Signed-off-by: Miguel Duarte Barroso <[email protected]>
ee90f39
to
135292e
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you!
Looks good, thanks for chasing these sorts of performance wins down! |
This PR changes the
bridge-cni
mac spoof protection to only read the required chain on CNI DELs (instead of the entire ruleset). This is required since without it we read the entire ruleset, which takes too long when there are plenty of provisioned rules.It requires an updated version of
go-nft
, which also imposes a timeout when trying to read the NFT configuration.These 2 features will hopefully reduce the time it takes to teardown pod networking on CNI DELs.
Fixes: https://bugzilla.redhat.com/show_bug.cgi?id=2175041