Skip to content

Conversation

@guillaumeblaquiere
Copy link

The default installation doesn't work as described in the documentation.

I fixed it like this

  • manifest apply no longer exists in istioctl CLI.
  • Add runAsRoot to allow targetPort creation bellow 1024.

manifest apply no longer exists in istioctl CLI.
Add runAsRoot to allow targetPort creation bellow 1024.
@googlebot googlebot added the cla: yes Indicates the PR's author has signed the CLA. label Aug 22, 2020
@knative-prow-robot
Copy link
Contributor

Welcome @guillaumeblaquiere! It looks like this is your first PR to knative/docs 🎉

@knative-prow-robot knative-prow-robot added the needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. label Aug 22, 2020
@knative-prow-robot
Copy link
Contributor

Hi @guillaumeblaquiere. Thanks for your PR.

I'm waiting for a knative member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@knative-prow-robot knative-prow-robot added the size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. label Aug 22, 2020
@nak3
Copy link
Contributor

nak3 commented Aug 23, 2020

Thank you @guillaumeblaquiere

This change makes change for v1.6+, but actually our CI still does not run against Istio 1.6 or later 😢 What should we do for this @JRBANCEL @tcnghia ?

/area network

@knative-prow-robot
Copy link
Contributor

@nak3: The label(s) area/network cannot be applied, because the repository doesn't have them

In response to this:

Thank you @guillaumeblaquiere

This change makes change for v1.6+, but actually our CI still does not run against Istio 1.6 or later 😢 What should we do for this @JRBANCEL @tcnghia ?

/area network

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@nak3
Copy link
Contributor

nak3 commented Aug 23, 2020

/area networking

@knative-prow-robot
Copy link
Contributor

@nak3: The label(s) area/networking cannot be applied, because the repository doesn't have them

In response to this:

/area networking

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

EOF

istioctl manifest apply -f istio-minimal-operator.yaml
istioctl manifest install -f istio-minimal-operator.yaml --set values.gateways.istio-ingressgateway.runAsRoot=true
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Why do we need this?
Last time I installed Istio (1.6.x), it opens ports in the 1024+ range and the service maps the real port to it.
For example, port 80 is mapped to 8080.
Is this not the case in 1.5?

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I tested early in august, with version 1.6.x it worked (I prepared a demo for the GDG Cloud Melbourne). Recently, I tested the 1.7 version (for a demo to the GDG Nantes (a city in France), tonight: 6pm CEST) and it didn't work. I fixed like this. There might be a better/nicer way.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

better than runAsRoot is to modify the configuration so that the requested targetPorts are high enough not to require root. Modifying the ports section of Istio-minimal-operator.yaml to look like the below should work with 1.7:

            - name: status-port
              port: 15021
              targetPort: 15021
            - name: http2
              port: 80
              targetPort: 8080
            - name: https
              port: 443
              targetPort: 8443

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@julz, I committed a new version thank to your comment after having testing it!

@mpetason
Copy link
Contributor

/ok-to-test

@knative-prow-robot knative-prow-robot added ok-to-test Indicates a non-member PR verified by an org member that is safe to test. and removed needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. labels Aug 24, 2020
Use targetPort instead of asRoot CLI parameter
@upodroid
Copy link
Member

upodroid commented Sep 1, 2020

I spent several hours debugging around till I noticed the cluster-local-gateway can't bind to privileged ports.

Fresh knative install with istio 1.7

Can we get this merged ASAP?

@nak3
Copy link
Contributor

nak3 commented Sep 4, 2020

@JRBANCEL @tcnghia @ZhiminXiang I was also asked about the status of Istio 1.7 for Knative. I am wondering that we should merge this for 1.7 and put a note about the issue we have seen in CI? (I am happy to send a follow up PR.) We may also want to update istio-latest test to 1.7, though.

@tcnghia
Copy link
Contributor

tcnghia commented Sep 4, 2020

+1 on that.

I think at this point I'd go with testing 1.7 in latest with reduced parallelism in place. stable will still be older but at least we have some coverage.

@julz
Copy link
Contributor

julz commented Sep 4, 2020

FWIW we've seen some big improvements in our load testing of knative with istio 1.7 with this fix applied: istio/istio#26918. It's not in 1.7, but it should be in 1.7.1 in a few days. The tl;dr is there was a race when Endpoints get created before Service that can sometimes cause the istio endpoint cache never to get updated, and this situation seems to occur in knative semi-regularly under load. Maybe this may even fix the problems at higher parallelism, if we're lucky, but either way - fyi.

@guillaumeblaquiere
Copy link
Author

Any updates on this? Any helps/comments that I can bring to you?

@nak3
Copy link
Contributor

nak3 commented Sep 10, 2020

I was thinking that we should wait for start testing Istio 1.7.1 which will include istio/istio#26985 but maybe we don't need to wait for it?

/lgtm
/assign @tcnghia @ZhiminXiang @JRBANCEL
/hold

@knative-prow-robot knative-prow-robot added the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Sep 10, 2020
@knative-prow-robot knative-prow-robot added the lgtm Indicates that a PR is ready to be merged. label Sep 10, 2020
@ZhiminXiang
Copy link

I think I may miss some context. What Istio versions could this PR apply to?

@nak3
Copy link
Contributor

nak3 commented Sep 10, 2020

It depends on istioctl version which users use. But without this PR, installation of istio 1.7 always fail. So this PR is kind of applying to Istio 1.7.

@JRBANCEL
Copy link
Contributor

JRBANCEL commented Sep 10, 2020

I don't think we need to start testing 1.7 since with or without this change Istio until 1.6 included works and this unblocks 1.7.

I don't see any risk or downside of this change (except that i might create some downtime but even Istio doesn't seem to care about this 😞)

@knative-prow-robot knative-prow-robot removed the lgtm Indicates that a PR is ready to be merged. label Sep 16, 2020
@tcnghia
Copy link
Contributor

tcnghia commented Sep 19, 2020

/unhold

(there is no objection to JR suggestion #2775 (comment) )

@knative-prow-robot knative-prow-robot removed the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Sep 19, 2020
Copy link
Contributor

@tcnghia tcnghia left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm

@knative-prow-robot knative-prow-robot added the lgtm Indicates that a PR is ready to be merged. label Sep 19, 2020
@knative-prow-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: guillaumeblaquiere, tcnghia

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@knative-prow-robot knative-prow-robot merged commit bd6307f into knative:release-0.17 Sep 19, 2020
arturenault pushed a commit to arturenault/docs that referenced this pull request Sep 21, 2020
* Fix default installation without sidecar injection

manifest apply no longer exists in istioctl CLI.
Add runAsRoot to allow targetPort creation bellow 1024.

* Remove the asRoot

Use targetPort instead of asRoot CLI parameter

* Remove manifest to istioctl
knative-prow-robot pushed a commit that referenced this pull request Oct 12, 2020
* Fix default installation without sidecar injection

manifest apply no longer exists in istioctl CLI.
Add runAsRoot to allow targetPort creation bellow 1024.

* Remove the asRoot

Use targetPort instead of asRoot CLI parameter

* Remove manifest to istioctl
knative-prow-robot pushed a commit that referenced this pull request Nov 10, 2020
* Fix default installation without sidecar injection

manifest apply no longer exists in istioctl CLI.
Add runAsRoot to allow targetPort creation bellow 1024.

* Remove the asRoot

Use targetPort instead of asRoot CLI parameter

* Remove manifest to istioctl
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

cla: yes Indicates the PR's author has signed the CLA. lgtm Indicates that a PR is ready to be merged. ok-to-test Indicates a non-member PR verified by an org member that is safe to test. size/XS Denotes a PR that changes 0-9 lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.