Skip to content

Fix network policy: add GKE service CIDR for Redis#228

Merged
RafaelPo merged 1 commit intomainfrom
fix/mcp-netpol-service-cidr
Feb 25, 2026
Merged

Fix network policy: add GKE service CIDR for Redis#228
RafaelPo merged 1 commit intomainfrom
fix/mcp-netpol-service-cidr

Conversation

@RafaelPo
Copy link
Contributor

Summary

  • Redis ClusterIP is 34.118.226.16 (GKE service CIDR), NOT in 10.0.0.0/8 (pod network)
  • Network policy ipBlock rule only allowed 10.0.0.0/8, blocking all Redis traffic
  • Add 34.118.224.0/20 to cover the GKE service CIDR

Root cause

The network policy assumed Redis IPs would be in the pod network (10.0.0.0/8), but GKE assigns ClusterIPs from a separate service CIDR (34.118.x.x). redis.ping() in the health check was blocked → liveness probe timeout → pod killed.

Test plan

  • Merge and deploy to staging
  • Pod reaches 1/1 Ready
  • Health checks return 200

🤖 Generated with Claude Code

The Redis ClusterIP (34.118.226.16) is in GKE's service CIDR, not in
10.0.0.0/8. The network policy was blocking all Redis traffic because
the ipBlock rule only covered the pod network.

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
@RafaelPo RafaelPo merged commit 3c363af into main Feb 25, 2026
5 checks passed
@RafaelPo RafaelPo deleted the fix/mcp-netpol-service-cidr branch February 25, 2026 15:13
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant