-
Notifications
You must be signed in to change notification settings - Fork 91
iptables rules interference #182
Comments
multiple sidecars in same pod? Well, we could basically punt on it stating that there can be only one, unless someone is willing to setup some super fancy chaining. |
We want enforcement for security policies (auth especially). Currently, you can escape rules by setting PID, which is probably good enough for now. |
We should also be prepared for scenarios where IPtables setup is not desired (in non kubernetes platforms). If this issue is being tracked for beta (Aug 31st), then support for another platform like CloudFoundry is definitely on the plate. |
Is there an adopted specification how to address services and ports with an explicit proxy? Should we adopt linkerd convention and only support HTTP? |
@smawson Should this still be part of 0.2 since it now resides in backlog? |
This is probably irrelevant now since we have settled on the transparent proxy setup. A better issue would be to enable non transparent proxy in k8s |
So should this be closed in favor of that epic? |
This issue is orthogonal to the transparent proxy injection. We need to leave it open and address it in 0.3. We need at a minimum to selectively capture traffic only for some of the container ports, opt-in or opt-out. Some of the other concerns from the description are also valid, but I see the selective capture as higher priority. |
Issue moved to istio/istio #1428 via ZenHub |
This is something that is inevitably going to pop up: how do we deal with multiple sidecars operating on iptables rules. At the very least, we should document how we can exclude traffic per port or per container/process from istio proxy traffic capture. For per node set-up, dealing with kube-proxy iptables rules in conjunction with istio proxy rules needs to be addressed.
The text was updated successfully, but these errors were encountered: