New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
bpf: exclude pod's reply traffic from egress gateway logic #17869
Conversation
|
I think we might want to have a CI test for it. |
61eecd0
to
5a20717
Compare
|
/test double checked locally that without the actual fix the new test fails: |
5a20717
to
426f8a6
Compare
079d4ca
to
e2497b4
Compare
e2497b4
to
a898866
Compare
|
/test |
|
/test-runtime vm provisioning failed with Job 'Cilium-PR-K8s-GKE' hit: #17545 (91.20% similarity) |
a898866
to
abff505
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🚀
abff505
to
922efdf
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
One non-blocking nit. Besides that 🚀 🌔
922efdf
to
9418bc4
Compare
|
/test Job 'Cilium-PR-K8s-1.22-kernel-4.9' hit: #17919 (92.89% similarity) Job 'Cilium-PR-K8s-GKE' failed and has not been observed before, so may be related to your PR: Click to show.Test NameFailure OutputIf it is a flake, comment |
Currently all pod traffic matching source IP and destination CIDR of an egress policy will be forwarded to an egress gateway. This means we will incorrectly forward to an egress gateway also all reply traffic from connections destined to a pod, breaking said connections. This commit fixes this by adding an additional check to make sure reply traffic (i.e. connections not originating from a pod) is excluded from the egress gateway logic. Fixes: #17866 Signed-off-by: Gilberto Bertin <gilberto@isovalent.com>
to make it more explicit its purpose Signed-off-by: Gilberto Bertin <gilberto@isovalent.com>
9418bc4
to
30a5753
Compare
|
One last change: moved the check in |
|
/test Job 'Cilium-PR-K8s-1.21-kernel-4.19' failed and has not been observed before, so may be related to your PR: Click to show.Test NameFailure OutputIf it is a flake, comment |
|
/test-4.19 |
Currently all pod traffic matching source IP and destination CIDR of an
egress policy will be forwarded to an egress gateway.
This means we will incorrectly forward to an egress gateway also all
reply traffic from connections destined to a pod, breaking said
connections.
This commit fixes this by adding an additional check to make sure reply
traffic (i.e. connections not originating from a pod) is excluded from
the egress gateway logic.
Fixes: #17866
Signed-off-by: Gilberto Bertin gilberto@isovalent.com