Skip to content

Unable to detect if pod passed network policies #984

@SerialVelocity

Description

@SerialVelocity

What happened?
Before 1.0.0-rc4, network traffic was "accepted" if network policies were matched. Now, they just return. This makes it very difficult to differentiate between whether the network policies were matched and passed or were unmatched.

What did you expect to happen?
Traffic to be accepted if it made it through the network policy or for a way to detect that it matched a network policy

How can we reproduce the behavior you experienced?
Steps to reproduce the behavior:

  1. Set iptables forward policy to drop
  2. Try and figure out how to unmatched traffic (such as host traffic and traffic that didn't match a network policy)

**Screenshots / Architecture Diagrams / Network Topologies **
None

** System Information (please complete the following information):**

  • Kube-Router Version (kube-router --version): 1.0.1
  • Kube-Router Parameters:
    - --hostname-override=172.28.0.3
    - --kubeconfig=/etc/kubernetes/kube-proxy-kubeconfig
    - --run-router=false
    - --run-firewall=true
    - --run-service-proxy=true
    - --service-cluster-ip-range=172.30.128.0/17
    - --metrics-port=20249
  • Kubernetes Version (kubectl version) : 1.18.6
  • Cloud Type: On premise
  • Kubernetes Deployment Type: Custom
  • Kube-Router Deployment Type: static pod
  • Cluster Size: 9 nodes

** Logs, other output, metrics **
None

Additional context

It would be nice if there was a flag to either go back to the old behaviour, have a post-processing table name, or a way to set a mark if the network policies were matched.

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions