Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

v1.11 backports 2022-02-22 #18888

Merged
merged 2 commits into from
Feb 23, 2022

Conversation

jrajahalme
Copy link
Member

@jrajahalme jrajahalme commented Feb 22, 2022

Once this PR is merged, you can update the PR labels via:

$ for pr in 18748 18899; do contrib/backporting/set-labels.py $pr done 1.11; done

@jrajahalme jrajahalme added release-note/bug This PR fixes an issue in a previous release of Cilium. kind/backports This PR provides functionality previously merged into master. backport/1.11 This PR represents a backport for Cilium 1.11.x of a PR that was merged to main. labels Feb 22, 2022
@jrajahalme jrajahalme requested a review from a team as a code owner February 22, 2022 18:51
@jrajahalme jrajahalme marked this pull request as draft February 22, 2022 18:51
@jrajahalme
Copy link
Member Author

jrajahalme commented Feb 22, 2022

/test-backport-1.11

Job 'Cilium-PR-K8s-1.19-kernel-4.9' failed:

Click to show.

Test Name

K8sServicesTest Checks service across nodes with L7 policy Tests NodePort with L7 Policy

Failure Output

FAIL: Request from testclient-btmzq pod to service tftp://[fd04::12]:30968/hello failed

If it is a flake and a GitHub issue doesn't already exist to track it, comment /mlh new-flake Cilium-PR-K8s-1.19-kernel-4.9 so I can create one.

Job 'Cilium-PR-K8s-1.18-kernel-4.9' failed:

Click to show.

Test Name

K8sConformance Portmap Chaining Check connectivity-check compliance with portmap chaining

Failure Output

FAIL: Found 1 k8s-app=cilium logs matching list of errors that must be investigated:

If it is a flake and a GitHub issue doesn't already exist to track it, comment /mlh new-flake Cilium-PR-K8s-1.18-kernel-4.9 so I can create one.

@jrajahalme jrajahalme changed the title envoy: Update to release 1.21.0 v1.11 backports 2022-02-22 Feb 22, 2022
@jrajahalme jrajahalme marked this pull request as ready for review February 22, 2022 20:50
@jrajahalme
Copy link
Member Author

runtime provision fail, retesting

@jrajahalme
Copy link
Member Author

/test-runtime

@joestringer
Copy link
Member

There's a known issue with runtime provisioning at the moment, which we hope to resolve in #18886 . If that's the only problem we have with runtime then I'll be inclined to ignore it to 🚢 .

[ upstream commit 28f0dae ]

Envoy Go API is updated to contain the generated validation code.

Envoy image is updated to support the new EndpointId option for the
bpf_metadata listener filter. NPDS field 'Policy' is renamed as
'EndpointID'. 'Policy' field was not used for anything, so might as
well recycle it while this API is not yet public.

Envoy retries may fail on "address already in use" when the original
source address and port are used on upstream connections. Cilium
typically does this in the egress proxy listeners. Fix this by using a
Cilium Envoy build that always sets SO_REUSEADDR when original source
address and port is used.

Signed-off-by: Jarno Rajahalme <jarno@isovalent.com>
[ upstream commit 571a484 ]

Signed-off-by: Jarno Rajahalme <jarno@isovalent.com>
@jrajahalme
Copy link
Member Author

/test-backport-1.11

@joestringer
Copy link
Member

Two failures:

@joestringer joestringer merged commit 59440f5 into cilium:v1.11 Feb 23, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
backport/1.11 This PR represents a backport for Cilium 1.11.x of a PR that was merged to main. kind/backports This PR provides functionality previously merged into master. release-note/bug This PR fixes an issue in a previous release of Cilium.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants