aboutsummaryrefslogtreecommitdiffstats
path: root/kud/demo/firewall
diff options
context:
space:
mode:
authorRitu Sood <ritu.sood@intel.com>2019-06-19 05:01:07 +0000
committerRitu Sood <ritu.sood@intel.com>2019-06-19 05:01:07 +0000
commit1b11b0510076c0cdf5ede9becadba9f77ba56389 (patch)
tree0700a08dcd8443bab59b85ff391b63a2a5c7872b /kud/demo/firewall
parentf30199f018ae167df804c23079eb4bcec6c10f34 (diff)
Multus error when the namesapace is not default
Multus has a limitation that namespace in which network is defined has to be explicitly provided. As we are defining network in "default" namespace, that needs to be provided in all deployment files Signed-off-by: Ritu Sood <ritu.sood@intel.com> Issue-ID: MULTICLOUD-663 Change-Id: Iefc17691fa909843f12fa35693900a063a6d20ae
Diffstat (limited to 'kud/demo/firewall')
-rw-r--r--kud/demo/firewall/charts/packetgen/templates/deployment.yaml2
-rw-r--r--kud/demo/firewall/charts/sink/templates/deployment.yaml2
-rw-r--r--kud/demo/firewall/templates/deployment.yaml2
3 files changed, 3 insertions, 3 deletions
diff --git a/kud/demo/firewall/charts/packetgen/templates/deployment.yaml b/kud/demo/firewall/charts/packetgen/templates/deployment.yaml
index a3aa165f..3538a6e7 100644
--- a/kud/demo/firewall/charts/packetgen/templates/deployment.yaml
+++ b/kud/demo/firewall/charts/packetgen/templates/deployment.yaml
@@ -43,7 +43,7 @@ spec:
- export protected_private_net_cidr={{ .Values.global.protectedPrivateNetCidr }}
- wget -O - https://git.onap.org/multicloud/k8s/plain/kud/tests/vFW/packetgen | sudo -E bash
VirtletRootVolumeSize: 5Gi
- k8s.v1.cni.cncf.io/networks: '[{"name": {{ .Values.global.ovnMultusNetworkName | quote }}}]'
+ k8s.v1.cni.cncf.io/networks: '[{"name": {{ .Values.global.ovnMultusNetworkName | quote }}, "namespace": "default"}]'
ovnNetwork: '[
{ "name": {{ .Values.global.unprotectedNetworkName | quote }}, "ipAddress": {{ .Values.global.vpgPrivateIp0 | quote }}, "interface": "eth1" , "defaultGateway": "false"},
{ "name": {{ .Values.global.onapPrivateNetworkName | quote }}, "ipAddress": {{ .Values.global.vpgPrivateIp1 | quote }}, "interface": "eth2" , "defaultGateway": "false"}
diff --git a/kud/demo/firewall/charts/sink/templates/deployment.yaml b/kud/demo/firewall/charts/sink/templates/deployment.yaml
index a988bc5d..57894010 100644
--- a/kud/demo/firewall/charts/sink/templates/deployment.yaml
+++ b/kud/demo/firewall/charts/sink/templates/deployment.yaml
@@ -18,7 +18,7 @@ spec:
app: {{ include "sink.name" . }}
release: {{ .Release.Name }}
annotations:
- k8s.v1.cni.cncf.io/networks: '[{"name": {{ .Values.global.ovnMultusNetworkName | quote }}}]'
+ k8s.v1.cni.cncf.io/networks: '[{"name": {{ .Values.global.ovnMultusNetworkName | quote }}, "namespace": "default"}]'
ovnNetwork: '[
{ "name": {{ .Values.global.protectedNetworkName | quote }}, "ipAddress": {{ .Values.global.vsnPrivateIp0 | quote }}, "interface": "eth1", "defaultGateway": "false" },
{ "name": {{ .Values.global.onapPrivateNetworkName | quote }}, "ipAddress": {{ .Values.global.vsnPrivateIp1 | quote }}, "interface": "eth2" , "defaultGateway": "false"}
diff --git a/kud/demo/firewall/templates/deployment.yaml b/kud/demo/firewall/templates/deployment.yaml
index 41362a75..b273d287 100644
--- a/kud/demo/firewall/templates/deployment.yaml
+++ b/kud/demo/firewall/templates/deployment.yaml
@@ -41,7 +41,7 @@ spec:
- export protected_private_net_cidr={{ .Values.global.protectedPrivateNetCidr }}
- wget -O - https://git.onap.org/multicloud/k8s/plain/kud/tests/vFW/firewall | sudo -E bash
VirtletRootVolumeSize: 5Gi
- k8s.v1.cni.cncf.io/networks: '[{"name": {{ .Values.global.ovnMultusNetworkName | quote }}}]'
+ k8s.v1.cni.cncf.io/networks: '[{"name": {{ .Values.global.ovnMultusNetworkName | quote }}, "namespace": "default"}]'
ovnNetwork: '[
{ "name": {{ .Values.global.unprotectedNetworkName | quote }}, "ipAddress": {{ .Values.global.vfwPrivateIp0 | quote }}, "interface": "eth1" , "defaultGateway": "false"},
{ "name": {{ .Values.global.protectedNetworkName | quote }}, "ipAddress": {{ .Values.global.vfwPrivateIp1 | quote }}, "interface": "eth2", "defaultGateway": "false" },