-
Notifications
You must be signed in to change notification settings - Fork 12
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add an output-chain, needed for proxy-mode=ipvs #47
Conversation
/cc @aojea @danwinship |
/approve I think this is ok, but let's wait if Dan have time for review |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: aojea, uablrek The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
@aojea What does "npa" mean? Is it a flake? It seem to be sctp related. I didn't exclude sctp when I ran e2e, so the ~5 sctp e2e test-cases works for me |
"NPA" seems to mean "AdminNetworkPolicy" |
/lgtm |
hmm, it passed in the other CI https://github.com/kubernetes-sigs/network-policy-api/actions/runs/9740745124/job/26878488301 |
Yeah, and failed 3 times with this PR. There is a link in the log to https://github.com/kubernetes-sigs/network-policy-api. |
it has to be this PR then |
it seems is blocking icmpv6 because does not recognize it It seems that is better to just log and let the packet pass through rather than applying the default policy, if is not a protocol that is supported by the network policy APIs blocking them can cause issues, @uablrek can you append a commit to comment this and set the verdict to accept if parsePacket fails? kube-network-policies/pkg/networkpolicy/controller.go Lines 392 to 396 in db089bc
|
hmm @BenTheElder points there are new changes on docker , another possible reason https://docs.docker.com/engine/release-notes/27.0/#ipv6 |
We just picked up docker v27.x in CI recently, see the thread here kubernetes-sigs/kind#3677 and kubernetes/test-infra#32863 (comment) Docker v27 has some behavior changes for ipv6. |
Sure |
New changes are detected. LGTM label has been removed. |
It may be better to extend |
ok, progressing, different error now??
|
This time the error seem unreated to the PR. How can allowing icmp make a StatefulSet fail to start?? |
the failure has to be related to the output rule we just added, it does not fail in #49 |
@uablrek please leave only first and last commit, |
interesting, anyway, this is the part we need to debug and troubleshoot |
Once we get this sorted out I cut a new release so we can get this into kindnet |
@uablrek can you rebase? |
I see, so the problem most likely was that blocking unknown protocols we were blocking icmp, that in IPv6 is needed for discovery ... that may be the reason why adding |
If the receiving pod is local, then ipvs sends packet via the output hook (not forward). So both are needed
PR needs rebase. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
@aojea This can be closed, right? |
yes |
we also have coverage now in CI for IPVS to avoid regressions |
If the receiving pod is local, then ipvs sends packet via the output hook (not forward). So both are needed
Fixes #46
Example:
The "chain output" is added by this PR.
Please see issue #46 for more info