New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
helm: almost always try to delete aws iptables #28697
Merged
Merged
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
maintainer-s-little-helper
bot
added
the
dont-merge/needs-release-note-label
The author needs to describe the release impact of these changes.
label
Oct 19, 2023
/test |
nebril
added
the
release-note/minor
This PR changes functionality that users may find relevant to operating Cilium.
label
Oct 20, 2023
maintainer-s-little-helper
bot
removed
the
dont-merge/needs-release-note-label
The author needs to describe the release impact of these changes.
label
Oct 20, 2023
nebril
force-pushed
the
pr/nebril/always-delete-aws-iptables
branch
from
October 20, 2023 09:54
9eabe18
to
e915824
Compare
/test |
squeed
approved these changes
Oct 20, 2023
nebril
added
the
needs-backport/1.14
This PR / issue needs backporting to the v1.14 branch
label
Oct 20, 2023
joamaki
approved these changes
Oct 23, 2023
nebril
added
dont-merge/blocked
Another PR must be merged before this one.
and removed
dont-merge/blocked
Another PR must be merged before this one.
labels
Oct 25, 2023
We recently introduced AWS-CONNMARK-CHAIN iptables rules deletion, but didn't add them to an if statement guarding actual deletion. Signed-off-by: Maciej Kwiek <maciej@isovalent.com>
This change causes Cilium DaemonSet postStart hook to always delete AWS iptable rules unless `cni.chainingMode` is set to `aws-cni`. This will result in the postStart hook being a noop in all non-AWS deployments. Unfortunately there is no way for helm chart to know whether it is running on AWS not in ENI mode. This approach will make sure that we are deleting AWS-specific iptables rules that cause issues while not requiring us to introduce new configuration flags for users. Signed-off-by: Maciej Kwiek <maciej@isovalent.com>
nebril
force-pushed
the
pr/nebril/always-delete-aws-iptables
branch
from
October 26, 2023 12:36
e915824
to
74632a5
Compare
/test |
All required checks passed, marking as ready to merge |
nebril
added
the
ready-to-merge
This PR has passed all tests and received consensus from code owners to merge.
label
Oct 27, 2023
pippolo84
added
backport-pending/1.14
The backport for Cilium 1.14.x for this PR is in progress.
and removed
needs-backport/1.14
This PR / issue needs backporting to the v1.14 branch
labels
Oct 30, 2023
jibi
added
backport-done/1.14
The backport for Cilium 1.14.x for this PR is done.
and removed
backport-pending/1.14
The backport for Cilium 1.14.x for this PR is in progress.
labels
Nov 7, 2023
maintainer-s-little-helper
bot
moved this from Needs backport from main
to Backport done to v1.14
in 1.14.4
Nov 7, 2023
giorio94
added a commit
to cilium/cilium-cli
that referenced
this pull request
Jan 30, 2024
…low" This reverts commit bbebbfa. Let's revert the flush stale AWS-CNI iptables rules workaround, as this operation is now automatically handled by Cilium [1,2]. Since bumping the Cilium version used in the EKS workflows to one which includes all fixes (v1.14.6), this workaround has also started failing, as the stale rules attempted to be removed are no longer present. [1]: cilium/cilium#28697 [2]: cilium/cilium#29448
giorio94
added a commit
to cilium/cilium-cli
that referenced
this pull request
Jan 30, 2024
…low" This reverts commit bbebbfa. Let's revert the flush stale AWS-CNI iptables rules workaround, as this operation is now automatically handled by Cilium [1,2]. Since bumping the Cilium version used in the EKS workflows to one which includes all fixes (v1.14.6), this workaround has also started failing, as the stale rules attempted to be removed are no longer present. [1]: cilium/cilium#28697 [2]: cilium/cilium#29448 Signed-off-by: Marco Iorio <marco.iorio@isovalent.com>
michi-covalent
pushed a commit
to cilium/cilium-cli
that referenced
this pull request
Jan 30, 2024
…low" This reverts commit bbebbfa. Let's revert the flush stale AWS-CNI iptables rules workaround, as this operation is now automatically handled by Cilium [1,2]. Since bumping the Cilium version used in the EKS workflows to one which includes all fixes (v1.14.6), this workaround has also started failing, as the stale rules attempted to be removed are no longer present. [1]: cilium/cilium#28697 [2]: cilium/cilium#29448 Signed-off-by: Marco Iorio <marco.iorio@isovalent.com>
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
backport-done/1.14
The backport for Cilium 1.14.x for this PR is done.
ready-to-merge
This PR has passed all tests and received consensus from code owners to merge.
release-note/minor
This PR changes functionality that users may find relevant to operating Cilium.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Fixes: #25804
This change causes Cilium DaemonSet postStart hook to always delete AWS
iptable rules unless
cni.chainingMode
is set toaws-cni
.This will result in the postStart hook being a noop in all non-AWS
deployments. Unfortunately there is no way for helm chart to know
whether it is running on AWS not in ENI mode.
This approach will make sure that we are deleting AWS-specific iptables
rules that cause issues while not requiring us to introduce new
configuration flags for users.
The PR also includes a change in poststart script that makes sure that we delete proper rules.
Credit for figuring out additional scenarios in which we need to delete these rules goes to @squeed and @rabbagliettiandrea