Prior to integrating Service Proxy for Kubernetes (SPK) into the OpenShift cluster, review this document to ensure the required software components are installed and properly configured.
The SPK and Red Hat software versions listed below are the tested versions. F5 recommends these versions for the best performance and installation experience.
|1.7.0 - 1.7.2||4.12.1|
|1.5.0 - 1.6.1||4.10.13|
|1.4.12 - 1.4.15||4.8.10|
|1.3.1 - 1.4.11||4.7.8|
To support low-latency 5G workloads, SPK relies on Single Root I/O Virtualization (SR-IOV) and the Open Virtual Network with Kubernetes (OVN-Kubernetes) CNI. To ensure the cluster supports multi-homed Pods; the ability to select either the default (virtual) CNI or the SR-IOV / OVN-Kubernetes (physical) CNI, review the sections below.
To properly manage the cluster networks, the OpenShift Cluster Network Operator must be installed.
Important: OpenShift 4.8 requires configuring local gateway mode using the steps below:
Create the manifest files:
openshift-install --dir=<install dir> create cluster
ConfigMapin new manifest directory, and add the following YAML code:
apiVersion: v1 kind: ConfigMap metadata: name: gateway-mode-config namespace: openshift-network-operator data: mode: "local" immutable: true
Create the cluster:
openshift-install create cluster --dir=<install dir>
The Cluster Network Operator installation on Github.
The table below lists the currently supported NICs.
|NIC||VF Driver||VF PCI ID|
|Intel Fortville 700 series *||net_i40evf||8086:154c|
|Mellanox ConnectX-5 25G/100G||net_mlx5||15b3:1018|
*Includes X710, XXV710, and XL710.
To define the SR-IOV Virtual Functions (VFs) used by the Service Proxy Traffic Management Microkernel (TMM), configure the following OpenShift network objects:
- An external and internal Network node policy.
- An external and internal Network attachment definition.
Refer to the SPK Config File Reference for examples.
Multiprocessor servers divide memory and CPUs into multiple NUMA nodes, each having a non-shared system bus. When installing the SPK Controller, the CPUs and SR-IOV VFs allocated to the Service Proxy TMM container must share the same NUMA node. To ensure the CPU NUMA node alignment is handled properly by the cluster ensure the following parameters are set:
- Set the Performance Profile’s Topology Manager Policy to
- Set the Kubelet configuration’s CPU Manager Policy to
staticin the Kubelet configuration.
The OpenShift Topology Manager dynamically allocates CPU resources, however, the Scheduler currently lacks two features required to support low-latency 5G applications:
- Simultaneous Multi-threading (SMT), or hyper-threading awareness.
- NUMA topology awareness.
Lacking these features, the scheduler can allocate CPUs to Numa core IDs that provide poor performance, or insufficient resources within a NUMA node to schedule Pods. To ensure the Service Proxy TMM Pods install with sufficient Numa resources:
- Disable SMT - To install Pods with Guaranteed QoS, each OpenShift worker node must have Simultaneous Multi-threading (SMT) disabled in the BIOS.
- Use Labels or Node Affinity - To assign Pods to worker nodes with sufficient resources, use Labels or Node Affinity. For a brief overview of using labels, refer to the Using Node Labels guide.
The required Fluentd logging collector, dSSM database and Traffic Management Microkernel (TMM) Debug Sidecar require an available Kubernetes persistent storage to bind to during installation.
Continue to the Getting Started guide to begin integrating the SPK software components.
Provide feedback to improve this document by emailing firstname.lastname@example.org.
- The CNI project.
- SPK Networking Overview.