Skip to content

gha/scale-egw: explicitly enable IPv4 masquerade #39367

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
May 7, 2025

Conversation

giorio94
Copy link
Member

@giorio94 giorio94 commented May 6, 2025

10f87e6 modified the helm defaulting logic, disabling IPv4Masquerade by default when running in ENI mode (as we do in this workflow). However, egress gateway relies on masquerading being enabled (and performed via BPF). Hence, let's explicitly enable IPv4 masquerading.

[1] modified the helm defaulting logic, disabling IPv4Masquerade by
default when running in ENI mode (as we do in this workflow). However,
egress gateway relies on masquerading being enabled (and performed via
BPF). Hence, let's explicitly enable IPv4 masquerading.

[1]: 10f87e6 ("aws: change IPv4Masquerade to false in ENI mode.")

Signed-off-by: Marco Iorio <marco.iorio@isovalent.com>
@giorio94 giorio94 added area/CI Continuous Integration testing issue or flake release-note/ci This PR makes changes to the CI. feature/egress-gateway Impacts the egress IP gateway feature. labels May 6, 2025
@giorio94
Copy link
Member Author

giorio94 commented May 6, 2025

/scale-egw

@giorio94
Copy link
Member Author

giorio94 commented May 6, 2025

/test

@giorio94 giorio94 marked this pull request as ready for review May 6, 2025 15:22
@giorio94 giorio94 requested review from a team as code owners May 6, 2025 15:22
@giorio94 giorio94 enabled auto-merge May 6, 2025 15:22
@@ -162,6 +162,7 @@ jobs:
--set=prometheus.enabled=true \
--set=cluster.name=${{ env.cluster_name }} \
${{ matrix.test_type == 'egw' && env.EGRESS_GATEWAY_HELM_VALUES || '' }} \
--set=enableIPv4Masquerade=true \
--set=bpf.masquerade=true \
--set=kubeProxyReplacement=true \
--set=l7Proxy=false \
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

(drive-by) do you remember whether we intentionally disabled the L7 proxy for this workflow, or if that's just a leftover from a time when EGW was incompatible? Then I'd be happy to open a PR and remove it.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

That option seems to have been there since the first commit that introduced the workflow, so my assumption would be that it is just a leftover from back then. I never removed it during subsequent iterations given that we are not creating any (L7) policy during the scale test, so it shouldn't actually matter from that point of view.

That said, the only aspect to pay attention to when removing it would be whether it changes the overall Cilium memory consumption due to the additional subsystems being enabled, as in that case the current threshold may need to be tuned a bit to avoid causing the workflow to fail (or become flaky).

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

That said, the only aspect to pay attention to when removing it would be whether it changes the overall Cilium memory consumption due to the additional subsystems being enabled, as in that case the current threshold may need to be tuned a bit to avoid causing the workflow to fail (or become flaky).

That's what I figured 👍. OTOH keeping it disabled is an artificial constraint, I think we should aim for testing with a default config where possible.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yep, makes total sense.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

-> #39421

@giorio94 giorio94 added this pull request to the merge queue May 7, 2025
Merged via the queue into main with commit 34fafe1 May 7, 2025
80 checks passed
@giorio94 giorio94 deleted the pr/giorio94/main/gha-scale-egw-masquerade branch May 7, 2025 07:16
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/CI Continuous Integration testing issue or flake feature/egress-gateway Impacts the egress IP gateway feature. release-note/ci This PR makes changes to the CI.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants