Skip to content

Fix network policy: allow Redis Sentinel port 26379#227

Merged
RafaelPo merged 1 commit intomainfrom
fix/mcp-netpol-sentinel-port
Feb 25, 2026
Merged

Fix network policy: allow Redis Sentinel port 26379#227
RafaelPo merged 1 commit intomainfrom
fix/mcp-netpol-sentinel-port

Conversation

@RafaelPo
Copy link
Contributor

Summary

  • Network policy egress rule only allowed port 6379 (Redis master) but blocked port 26379 (Redis Sentinel)
  • Pod connects to Sentinel first to discover the master — blocking 26379 causes redis.ping() to hang
  • Health probes timeout (5s) → liveness kills the container → CrashLoopBackOff

Changes

  • networkpolicy.yaml: Add Sentinel port alongside master port in Redis egress rule
  • values.yaml: Add redisSentinelPort: 26379 config value

Test plan

  • Merge and deploy to staging
  • Pod passes health checks and stays Running
  • kubectl logs shows GET /health 200

🤖 Generated with Claude Code

The egress network policy only allowed port 6379 (Redis master) but
blocked port 26379 (Redis Sentinel). The pod connects to Sentinel first
to discover the master, so blocking 26379 caused redis.ping() to hang,
health probes to timeout, and the pod to be killed by liveness checks.

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
@RafaelPo RafaelPo merged commit 0200e7e into main Feb 25, 2026
5 checks passed
@RafaelPo RafaelPo deleted the fix/mcp-netpol-sentinel-port branch February 25, 2026 14:54
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant