Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add network policy related metadata to flow records #2163

Merged
merged 1 commit into from
May 28, 2021

Conversation

heanlan
Copy link
Contributor

@heanlan heanlan commented May 11, 2021

  1. Add fields: network policy type, rule name to flow records of flow exporter
  2. Update related unit-tests, e2e tests
  3. Make necessary changes on elk-flow-collector and flow-visibility doc

Fixes #1545

@codecov-commenter
Copy link

codecov-commenter commented May 11, 2021

Codecov Report

Merging #2163 (2395aa1) into main (d8d8626) will increase coverage by 3.59%.
The diff coverage is 77.27%.

Impacted file tree graph

@@            Coverage Diff             @@
##             main    #2163      +/-   ##
==========================================
+ Coverage   61.83%   65.42%   +3.59%     
==========================================
  Files         276      276              
  Lines       21145    21183      +38     
==========================================
+ Hits        13074    13858     +784     
+ Misses       6702     5918     -784     
- Partials     1369     1407      +38     
Flag Coverage Δ
e2e-tests 56.65% <77.27%> (?)
kind-e2e-tests 53.10% <77.27%> (+0.13%) ⬆️
unit-tests 41.31% <45.71%> (+0.03%) ⬆️

Flags with carried forward coverage won't be shown. Click here to find out more.

Impacted Files Coverage Δ
pkg/flowaggregator/flowaggregator.go 62.71% <ø> (+4.66%) ⬆️
pkg/agent/flowexporter/utils.go 66.66% <55.55%> (-4.77%) ⬇️
.../flowexporter/connections/conntrack_connections.go 78.33% <60.00%> (+1.14%) ⬆️
pkg/agent/controller/networkpolicy/packetin.go 72.81% <77.77%> (+0.95%) ⬆️
pkg/agent/flowexporter/exporter/exporter.go 78.58% <100.00%> (+1.28%) ⬆️
...ntroller/networkpolicy/networkpolicy_controller.go 69.45% <0.00%> (-0.65%) ⬇️
pkg/ovs/openflow/ofctrl_bridge.go 50.36% <0.00%> (+0.36%) ⬆️
pkg/agent/openflow/network_policy.go 76.41% <0.00%> (+0.59%) ⬆️
pkg/apiserver/certificate/cacert_controller.go 58.94% <0.00%> (+0.66%) ⬆️
... and 47 more

@heanlan heanlan force-pushed the flow-records-metadata branch 2 times, most recently from 4ae17e4 to 9bc8e51 Compare May 11, 2021 19:00
Copy link
Member

@srikartati srikartati left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for adding more netpol info in flow records. Could you improve the flow aggregator e2e test as well, where we check the netpol info?

@heanlan
Copy link
Contributor Author

heanlan commented May 11, 2021

Thanks for adding more netpol info in flow records. Could you improve the flow aggregator e2e test as well, where we check the netpol info?

For sure. I'm also trying to add the e2e test, just facing some interface issue. If I understood correctly, we are using packages networking.v1, meta.v1 to initialize network policies, in flowaggregator_test.go. The interfaces include policy UID, but don’t include policy type, rule name, rule priority(I don't think we need to test on rule priority, since it's actually the ovs flow priority internally computed from tier priority, policy priority, rule priority).

Do we need to change to other interfaces in order to construct network policies including policy type and rule name? I noticed antrea/pkg/apis/controlplane/types.go offers that kind of interface. To make those changes, I might need to change the createNetworkPolicy, deleteNetworkPolicy functions in framework.go, along with other e2e test files which make use of those two functions.

@srikartati
Copy link
Member

For sure. I'm also trying to add the e2e test, just facing some interface issue. If I understood correctly, we are using packages networking.v1, meta.v1 to initialize network policies, in flowaggregator_test.go. The interfaces include policy UID, but don’t include policy type, rule name, rule priority(I don't think we need to test on rule priority, since it's actually the ovs flow priority internally computed from tier priority, policy priority, rule priority).

Do we need to change to other interfaces in order to construct network policies including policy type and rule name? I noticed antrea/pkg/apis/controlplane/types.go offers that kind of interface. To make those changes, I might need to change the createNetworkPolicy, deleteNetworkPolicy functions in framework.go, along with other e2e test files which make use of those two functions.

Sure, I think those fields policy UID are present in Antrea network policy. Instead of changing the existing test with K8s policy, can you add a new test with the Antrea network policy for one of the flow cases?

@srikartati srikartati added this to the Antrea v1.1 release milestone May 12, 2021
Copy link
Contributor

@zyiou zyiou left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Don't forget to test with elk flow collector. Some changes are needed as we are adding new fields.

conn.IngressNetworkPolicyRuleName = rule.Name
// TODO: tier name, tier priority, policy priority to be added when support available
if policy.Type == "K8sNetworkPolicy" {
conn.IngressNetworkPolicyRulePriority = -1
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Better to use the const defined in go-ipfix

"ingressNetworkPolicyUID",
"ingressNetworkPolicyType",
"ingressNetworkPolicyRuleName",
"ingressNetworkPolicyRulePriority",
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I believe go-ipfix has not supported correlation of data type signed32, we should add that before using it here.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Not sure if I get it. I have already changed rule priority's type to signed32 in go-ipfix. In the output of template set, it shows rule priority's length to be 4.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I get it.. Will make more correlated changes in go-ipfix

"egressNetworkPolicyUID",
"egressNetworkPolicyType",
"egressNetworkPolicyRuleName",
"egressNetworkPolicyRulePriority",
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

same above.

if policy == nil {
// This should not happen because the rule flow ID to rule mapping is
// preserved for max(5s, flowPollInterval) even after the rule deletion.
klog.Warningf("Cannot find NetworkPolicy that has rule with egressOfID %v", egressOfID)
} else {
conn.EgressNetworkPolicyName = policy.Name
conn.EgressNetworkPolicyNamespace = policy.Namespace
conn.EgressNetworkPolicyUID = string(policy.UID)
switch policy.Type {
case "K8sNetworkPolicy":
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It would be better to use const from definitions likepkg/apis/controlplane/types.go instead of string here.

conn.EgressNetworkPolicyType = 3
}
conn.EgressNetworkPolicyRuleName = rule.Name
if policy.Type == "K8sNetworkPolicy" {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

same here.

expConn.EgressNetworkPolicyUID = string(np2.UID)
switch np2.Type {
case cpv1beta.K8sNetworkPolicy:
expConn.EgressNetworkPolicyType = 1
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

we can use const defined in go-ipfix instead of self-assigned value, same for next several uses.

@heanlan heanlan marked this pull request as draft May 12, 2021 20:25
@heanlan heanlan force-pushed the flow-records-metadata branch 3 times, most recently from 831ef4a to 0b02e77 Compare May 14, 2021 22:20
@heanlan heanlan marked this pull request as ready for review May 14, 2021 22:34
@heanlan heanlan marked this pull request as draft May 14, 2021 22:47
@heanlan heanlan marked this pull request as ready for review May 14, 2021 22:58
@heanlan heanlan marked this pull request as draft May 14, 2021 23:24
@heanlan heanlan marked this pull request as ready for review May 15, 2021 06:47
@heanlan heanlan requested review from srikartati and zyiou May 17, 2021 19:59
@heanlan heanlan force-pushed the flow-records-metadata branch 2 times, most recently from cadc529 to 19d8b58 Compare May 17, 2021 21:54
Copy link
Member

@srikartati srikartati left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Few comments in the e2e test, otherwise LGTM

}
})

// InterNodeFlows tests the case, where Pods are deployed on different Nodes
// and their flow information is exported as IPFIX flow records.
t.Run("InterNodeFlows", func(t *testing.T) {
np1, np2 := deployNetworkPolicies(t, data, "perftest-a", "perftest-c")
anp1, anp2 := deployAntreaNetworkPolicies(t, data, "perftest-a", "perftest-c")
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

A comment that says Antrea network policy is being tested here right before the test and at "IntraNodeFlows" K8s network policy being tested would be useful.

@@ -153,33 +172,31 @@ func testHelper(t *testing.T, data *TestData, podAIPs *PodIPs, podBIPs *PodIPs,
}
}()
// TODO: Skipping bandwidth check for Intra-Node flows as it is flaky.
// test on K8s network policies
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Move the comment to right before the test.
Change the name of deployNetworkPolicies to deployK8sNetworkPolicies and similarly for related functions.

// Check if records have both ingress and egress network policies.
if !strings.Contains(record, ingressNetworkPolicyName) {
t.Errorf("Record does not have NetworkPolicy name with ingress rule")
}
if !strings.Contains(record, fmt.Sprintf("%s: %s", "ingressNetworkPolicyNamespace", testNamespace)) {
t.Errorf("Record does not have correct ingressNetworkPolicyNamespace")
}
if !strings.Contains(record, "ingressNetworkPolicyUID") {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Could we add a custom UID when adding configuring the policy and validate that here?
You have to change the underlying createNetworkPolicy function a little bit.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

For K8s network policy, the UID can be customized. But for Antrea network policy, the AntreaNetworkPolicySpecBuilder doesn't support us to customize the UID. Do you think that's ok for us to only validate K8s np's UID? I feel testing on K8s np is indeed good enough, but it may looks a bit inconsistent, for testing on the different fields with different flow types?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Testing only for k8s NP is fine with me.

if !strings.Contains(record, egressNetworkPolicyName) {
t.Errorf("Record does not have NetworkPolicy name with egress rule")
}
if !strings.Contains(record, fmt.Sprintf("%s: %s", "egressNetworkPolicyNamespace", testNamespace)) {
t.Errorf("Record does not have correct egressNetworkPolicyNamespace")
}
if !strings.Contains(record, "egressNetworkPolicyUID") {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

same here

if !strings.Contains(record, fmt.Sprintf("%s: %s", "ingressNetworkPolicyNamespace", testNamespace)) {
t.Errorf("Record does not have correct ingressNetworkPolicyNamespace")
}
if !strings.Contains(record, "ingressNetworkPolicyUID") {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

same here.

busyboxImage = "projects.registry.vmware.com/library/busybox"
nginxImage = "projects.registry.vmware.com/antrea/nginx"
perftoolImage = "projects.registry.vmware.com/antrea/perftool"
// ipfixCollectorImage = "projects.registry.vmware.com/antrea/ipfix-collector:v0.5.1"
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

are you not able to access harbor regisstry?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Have changed it back. Thanks for reminding!

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't think you pushed?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Just pushed. I was waiting for Srikar's reply on the comments of e2e test. Sorry for the confusion.

Copy link
Contributor

@antoninbas antoninbas left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

sorry for the late review

busyboxImage = "projects.registry.vmware.com/library/busybox"
nginxImage = "projects.registry.vmware.com/antrea/nginx"
perftoolImage = "projects.registry.vmware.com/antrea/perftool"
// ipfixCollectorImage = "projects.registry.vmware.com/antrea/ipfix-collector:v0.5.1"
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't think you pushed?

Comment on lines 4073 to 4090
114:
- :string
- :ingressNetworkPolicyUID
115:
- :uint8
- :ingressNetworkPolicyType
116:
- :int32
- :ingressNetworkPolicyPriority
117:
- :string
- :egressNetworkPolicyUID
118:
- :uint8
- :egressNetworkPolicyType
119:
- :int32
- :egressNetworkPolicyPriority
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

while adding the policy type makes sense to me, I am not so sure about adding the UID and the priority... The UID is duplicate information once you have the type and the name. The priority is also unnecessary IMO since we can retrieve it based on the rule name. We are just growing the record size, but I don't see much benefit. If a tool needs to retrieve this information, it could be given access to the K8s API. Any opinion on this @jianjuns and @tnqn?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

For UID, yes, it means nothing for most users and it cannot be used to get a resource from K8s API. Normally it's only useful to distinguish resources having same name while existing in different time. If the records are only used for flow visibility, I would agree UID has no much value.
For priority, it seems that it's the openflow priority which is dynamically assigned on each Node, so even same policy rule will have different values when agents export them. Will it be really useful?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Regarding UID, the use case we thought of earlier is not to show to the user but it's for integration with systems, where there is access to k8s API of the cluster and UID could be used to fetch the network policy object rather than using the name.
For priority, I was not aware that each agent computes its own priority for a given rule. If that is the case, I agree that it cannot be used. We should show policy priority or tier priority. IMO, we can remove this rule priority for now.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Normally it's only useful to distinguish resources having same name while existing in different time.

@tnqn Do you think it is a case that we need to handle here? If yes, it feels like we should also include the UID for the other K8s resources as well, e.g. source & destination Pods.

I feel like it's all or nothing. Either we include UIDs for all K8s resources, in which case it makes the records larger and adds complexity, or we include it for none of them. The advantage of including the UID is to make sure that we get the correct resource by name from the K8s API.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Regarding UID, the use case we thought of earlier is not to show to the user but it's for integration with systems, where there is access to k8s API of the cluster and UID could be used to fetch the network policy object rather than using the name.

@srikartati But UID in K8s can not be used to fetch object, the primary key in API and etcd is [namespace/]name.

@antoninbas I feel resources with same name usually mean same thing, and pods' names are usually auto-generated randomly so unlikely conflict.. Maybe we can start from not including it and consider adding it when user complains not being able to distinguish records of historial objects causes real problem.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@srikartati But UID in K8s can not be used to fetch object, the primary key in API and etcd is [namespace/]name.

@tnqn I meant in systems where the K8s objects are stored in a separate inventory and given that it is organized by using UID. At the same time, we can request a different inventory organization as well.. not a concrete use-case.

I see Antonin's point that we may need UID for all objects in that case. I agree that we can remove it for now and take it up in the future if there is a strong requirement.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Agreed. Let's remove it for now. It's easier to just add something later if we actually need it.

"antrea.io/antrea/pkg/querier"
"github.com/vmware/go-ipfix/pkg/registry"
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

wrong place

@@ -23,12 +23,15 @@ import (
corev1 "k8s.io/api/core/v1"
"k8s.io/klog/v2"

"github.com/vmware/go-ipfix/pkg/registry"
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

should be in the same group as "k8s.io/klog/v2"

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

fixed, thanks!

Comment on lines 4073 to 4090
114:
- :string
- :ingressNetworkPolicyUID
115:
- :uint8
- :ingressNetworkPolicyType
116:
- :int32
- :ingressNetworkPolicyPriority
117:
- :string
- :egressNetworkPolicyUID
118:
- :uint8
- :egressNetworkPolicyType
119:
- :int32
- :egressNetworkPolicyPriority
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

For UID, yes, it means nothing for most users and it cannot be used to get a resource from K8s API. Normally it's only useful to distinguish resources having same name while existing in different time. If the records are only used for flow visibility, I would agree UID has no much value.
For priority, it seems that it's the openflow priority which is dynamically assigned on each Node, so even same policy rule will have different values when agents export them. Will it be really useful?

Comment on lines 4073 to 4090
114:
- :string
- :ingressNetworkPolicyUID
115:
- :uint8
- :ingressNetworkPolicyType
116:
- :int32
- :ingressNetworkPolicyPriority
117:
- :string
- :egressNetworkPolicyUID
118:
- :uint8
- :egressNetworkPolicyType
119:
- :int32
- :egressNetworkPolicyPriority
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Regarding UID, the use case we thought of earlier is not to show to the user but it's for integration with systems, where there is access to k8s API of the cluster and UID could be used to fetch the network policy object rather than using the name.
For priority, I was not aware that each agent computes its own priority for a given rule. If that is the case, I agree that it cannot be used. We should show policy priority or tier priority. IMO, we can remove this rule priority for now.

networkingv1 "k8s.io/api/networking/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/util/wait"

crdv1alpha1 "antrea.io/antrea/pkg/apis/crd/v1alpha1"
. "antrea.io/antrea/test/e2e/utils"
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

do you need a period here?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

removed, thanks

// Check if records have both ingress and egress network policies.
if !strings.Contains(record, ingressNetworkPolicyName) {
t.Errorf("Record does not have NetworkPolicy name with ingress rule")
}
if !strings.Contains(record, fmt.Sprintf("%s: %s", "ingressNetworkPolicyNamespace", testNamespace)) {
t.Errorf("Record does not have correct ingressNetworkPolicyNamespace")
}
if !strings.Contains(record, "ingressNetworkPolicyUID") {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Testing only for k8s NP is fine with me.

| ingressNetworkPolicyType | 56506 | 115 | unsigned8 |
| ingressNetworkPolicyRuleName | 56506 | 111 | string |
| ingressNetworkPolicyRulePriority | 56506 | 116 | signed32 |
| egressNetworkPolicyName | 56506 | 141 | string |
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

same above

| ingressNetworkPolicyNamespace | 56506 | 111 | string |
| ingressNetworkPolicyUID | 56506 | 114 | string |
| ingressNetworkPolicyType | 56506 | 115 | unsigned8 |
| ingressNetworkPolicyRuleName | 56506 | 111 | string |
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is the field ID correct?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

fixed, thanks for reminding

Comment on lines 70 to 73
ingressNetworkPolicyUID: ac42f0ba-f580-46ae-8336-2bfc45024a9a
ingressNetworkPolicyType: 2
ingressNetworkPolicyRuleName: test-ingress-rule-name
ingressNetworkPolicyRulePriority: 50000
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

extra indent here

Copy link
Contributor Author

@heanlan heanlan May 24, 2021

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

have no idea why there is an extra indent, which doesn't exist locally.
There is also extra indent in the main:

egressNetworkPolicyUID: bbbc0320-b461-45e3-987a-d2d7caf7aad3
egressNetworkPolicyType: 2
egressNetworkPolicyRuleName: test-egress-rule-name
egressNetworkPolicyRulePriority: 50000
flowType: 1
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

same here.

@heanlan
Copy link
Contributor Author

heanlan commented May 27, 2021

/test-all

@heanlan heanlan force-pushed the flow-records-metadata branch 2 times, most recently from 42aaf8e to 63a951b Compare May 27, 2021 23:09
@heanlan
Copy link
Contributor Author

heanlan commented May 27, 2021

/test-all

@heanlan heanlan requested a review from antoninbas May 27, 2021 23:10
antoninbas
antoninbas previously approved these changes May 27, 2021
@heanlan
Copy link
Contributor Author

heanlan commented May 28, 2021

/test-e2e

@heanlan
Copy link
Contributor Author

heanlan commented May 28, 2021

/test-networkpolicy

tnqn
tnqn previously approved these changes May 28, 2021
Copy link
Member

@tnqn tnqn left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@antoninbas
Copy link
Contributor

/test-all

change to const in unit-test

add e2e test

add new fields to doc

changes on elk-flow-collector side

change dependency module and image name

change to const

change ipfix dependency back to before v0.5.1

fix api issue

Signed-off-by: heanlan <[email protected]>
@heanlan
Copy link
Contributor Author

heanlan commented May 28, 2021

/test-all

@heanlan
Copy link
Contributor Author

heanlan commented May 28, 2021

jenkins-e2e failed on somewhere unrelated with this PR. TestFlowAggregator passed all the tests.

--- PASS: TestFlowAggregator (225.18s)
--- PASS: TestFlowAggregator/IPv4 (86.92s)
--- PASS: TestFlowAggregator/IPv4/IntraNodeFlows (14.68s)
--- PASS: TestFlowAggregator/IPv4/IntraNodeDenyConnIngressANP (3.14s)
--- PASS: TestFlowAggregator/IPv4/IntraNodeDenyConnEgressANP (3.67s)
--- PASS: TestFlowAggregator/IPv4/IntraNodeDenyConnNP (5.09s)
--- PASS: TestFlowAggregator/IPv4/InterNodeFlows (13.77s)
--- PASS: TestFlowAggregator/IPv4/InterNodeDenyConnIngressANP (3.19s)
--- PASS: TestFlowAggregator/IPv4/InterNodeDenyConnEgressANP (3.11s)
--- PASS: TestFlowAggregator/IPv4/InterNodeDenyConnNP (9.14s)
--- PASS: TestFlowAggregator/IPv4/LocalServiceAccess (14.34s)
--- PASS: TestFlowAggregator/IPv4/RemoteServiceAccess (13.68s)

@srikartati
Copy link
Member

srikartati commented May 28, 2021

Flow aggregator tests have passed:
--- PASS: TestFlowAggregator (225.18s)
--- PASS: TestFlowAggregator/IPv4 (86.92s)
--- PASS: TestFlowAggregator/IPv4/IntraNodeFlows (14.68s)
--- PASS: TestFlowAggregator/IPv4/IntraNodeDenyConnIngressANP (3.14s)
--- PASS: TestFlowAggregator/IPv4/IntraNodeDenyConnEgressANP (3.67s)
--- PASS: TestFlowAggregator/IPv4/IntraNodeDenyConnNP (5.09s)
--- PASS: TestFlowAggregator/IPv4/InterNodeFlows (13.77s)
--- PASS: TestFlowAggregator/IPv4/InterNodeDenyConnIngressANP (3.19s)
--- PASS: TestFlowAggregator/IPv4/InterNodeDenyConnEgressANP (3.11s)
--- PASS: TestFlowAggregator/IPv4/InterNodeDenyConnNP (9.14s)
--- PASS: TestFlowAggregator/IPv4/LocalServiceAccess (14.34s)
--- PASS: TestFlowAggregator/IPv4/RemoteServiceAccess (13.68s)

TestUserProvidedCert test has failed.
@tnqn I am running the test again. Could you please monitor this PR and merge?
/test-e2e

@tnqn
Copy link
Member

tnqn commented May 28, 2021

@tnqn I am running the test again. Could you please monitor this PR and merge?

@srikartati Sure!

@antoninbas antoninbas merged commit 3560475 into antrea-io:main May 28, 2021
@heanlan heanlan deleted the flow-records-metadata branch May 28, 2021 07:50
@zyiou zyiou added area/flow-visibility Issues or PRs related to flow visibility support in Antrea area/flow-visibility/aggregator Issues or PRs related to Flow Aggregator area/flow-visibility/exporter Issues or PRs related to the Flow Exporter functions in the Agent and removed area/flow-visibility/aggregator Issues or PRs related to Flow Aggregator labels Jun 9, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/flow-visibility/exporter Issues or PRs related to the Flow Exporter functions in the Agent area/flow-visibility Issues or PRs related to flow visibility support in Antrea
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Enhancements to NetworkPolicy support in Antrea Flow Exporter
7 participants