-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
kops-installed kubernetes-iptables-setup.service voids weave-npc rules from working, making kops + weave unusable for kubernetes network policies #4345
Comments
BTW below
|
/cc @bboreham @jjo what specific rule(s) need to change for weave? /cc @caseydavenport does this impact calico as well? |
@chrislovecnm from the description above, I don't think this will affect Calico. |
The issue is that (freshly after boot) added We could instead do that in the same script (flip the default policy to In any case, seems that we'd need to revisit the logic behind that |
I believe this would be mostly fixed by weaveworks/weave#3210 wherein we insert our drop rule at the top of the chain. “mostly” because someone can still come along later and insert an accept rule ahead of our drop rule. |
@bboreham that will be in weave 2.2? |
Yes, just released https://github.com/weaveworks/weave/releases/tag/v2.2.0 |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
This is still an issue with 1.9.0 and running |
Looks like with kops 1.9.0 and the hook work around above I'm still seeing it fail to restrict egress using a default egress policy.
|
@sstarcher the issue reported here has been fixed already (weave >= 2.3), |
@jjo let me retest, but I was using weave 2.3.0 and it looked like it was still broken. |
Not clear why you are @-ing me. The tracking issue for support of egress policies in Weave Net is weaveworks/weave#2624 as linked above. |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
The original issue was fixed in Weave Net 2.2.0 /close |
kops
version are you running? The commandkops version
, will displaythis information.
Version 1.8.0 (git-5099bc5)
kubectl version
will print theversion if a cluster is running or provide the Kubernetes version specified as
a
kops
flag.1.8.5
, usingimage: kope.io/k8s-1.8-debian-jessie-amd64-hvm-ebs-2017-12-02
and
weave
/weave-npc
manually upgraded images to2.1.3
(as there's no kops 1.8 release including #3944)
AWS
Deploy a 1.8.5 cluster with 'networking: weave' via kops-1.8
Expecting some simple network policies example like
https://kubernetes.io/docs/concepts/services-networking/network-policies/#default-deny-all-ingress-traffic
to work
Traffic DROPped as per kubernetes network policy
N/A really - using weave as (and above
image
):Please run the commands with most verbose logging by adding the
-v 10
flag.Paste the logs into this report, or in a gist and provide the gist link here.
Anything else do we need to know?
kops firewalling setup is added by https://github.com/kubernetes/kops/blob/master/nodeup/pkg/model/firewall.go:
/home/kubernetes/bin/iptables-setup
kubernetes-iptables-setup.service
to run aboveThis interferes with
weave-npc
DaemonSet iptables hooks, as weave-npc rules willbe added after above the 3 kops added rules (thanks @mmikulicic for the hard debugging on this!)
The text was updated successfully, but these errors were encountered: