-
Notifications
You must be signed in to change notification settings - Fork 3.4k
cilium: support service source ranges also for other types #35512
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
/test |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Helm LGTM
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for the fix and improvements! I left some suggestions inline. 🎉
BTW: Commit checks are failing: Error: ERROR:BAD_SIGN_OFF: Unrecognized email address: '@judge-red'
& Error: ERROR:CUSTOM: Please avoid long commit subjects (max: 75, found: 78)
It's a GH handle, in some of the cases we use these in the Reported-by where we don't have an email. The checkpatch commit subject nits imho can be ignored if they're <= ~80 chars, it's mostly a kernel thing and not even there strictly enforced (now obviously, one shouldn't have 90+ chars as subject). |
a720b0c
to
8b31e8f
Compare
checkLBSrcRange boolean determines whether the LB map service entry has the flag to perform source CIDR checks or not. This should only be set if the current service (not the old one) contains source CIDRs. When the flag is not cleared after removing loadbalancerSourceRanges from a LoadBalancer service, then all traffic to that service will be blackholed as there is no CIDR entry to allow traffic anymore! Fixes: #32617 Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
8b31e8f
to
4827d5d
Compare
/test |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM, thanks for addressing my suggestions. (only one non-blocking nit left)
…her types Sandro Mathys reported that loadbalancerSourceRanges are only enforced for LoadBalancer services, but not for NodePort services which poses a problem in some environments such as OpenStack. He says: In OpenStack, the NodePort service is the backend of the load balancer, thus that's where the filtering needs to happen. And thus the NodePort allocation can't be disabled. In order to avoid breaking existing behavior, add an option which is called bpf-lb-source-range-all-types that can be set to {true,false} (default false) and when enabled it installs the CIDR filters to all services which receive cluster external (N/S) traffic. Fixes: #34903 Reported-by: Sandro Mathys <sandro@mathys.io> Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Add a config to make this option also accessible to Helm users. Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Extend the section to document possibilities for filtering traffic. Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Add proper docs as we use this now already in two examples, but a dedicated section with explanation was still missing. Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
4827d5d
to
413a09a
Compare
/test |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM for docs, thanks!
(see commit msg)