Skip to content

Conversation

rlenglet
Copy link
Contributor

@rlenglet rlenglet commented Mar 30, 2018

Modify proxy containers to use TPROXY to redirect inbound connections to Envoy. Contrary to REDIRECT, TPROXY doesn't perform NAT, and therefore preserves both source and destination IP addresses and ports of inbound connections. One benefit is that the source.ip attributes reported by Mixer for inbound connections will always be correct, unlike when using REDIRECT.

Keep using REDIRECT for outbound traffic, since TPROXY can only be used in PREROUTING.

The support for TPROXY in Envoy was implemented in envoyproxy/envoy#2719 and pulled into Istio in #4651 and istio/proxy#1338.

Modify the proxy images and Debian package to support running envoy with CAP_NET_ADMIN to enable setting the IP_TRANSPARENT option on listen sockets.
Support setting the inbound traffic interception mode ("REDIRECT" or "TPROXY") in ProxySettings config maps.
Send the interception mode to pilot-discovery in the INTERCEPTION_MODE Node metadata to set the listener socket transparent setting for that proxy.

Add iptables anbd iproute2 as dependencies to the istio.deb package. iptables was already required but was missing.
Install iproute2 into the proxy_init Docker image.

Fix the deb/* Makefile targets.

Requires: #4651 (to update go-control-plane vendor dep), istio/proxy#1338 (to support transparent listener option in Envoy)

Signed-off-by: Romain Lenglet romain@covalent.io

@googlebot
Copy link
Collaborator

Thanks for your pull request. It looks like this may be your first contribution to a Google open source project (if not, look below for help). Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA).

📝 Please visit https://cla.developers.google.com/ to sign.

Once you've signed (or fixed any issues), please reply here (e.g. I signed it!) and we'll verify it.


What to do if you already signed the CLA

Individual signers
Corporate signers

@istio-testing
Copy link
Collaborator

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:
To fully approve this pull request, please assign additional approvers.
We suggest the following additional approver: linsun

Assign the PR to them by writing /assign @linsun in a comment when ready.

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@rlenglet
Copy link
Contributor Author

Please note that istio/old_vendor-istio_repo#46 and istio/proxy#1338 need to be merged before this PR.

Copy link
Member

@rshriram rshriram left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

First of all, thanks a lot for this great work. I am super happy you figured out all the pieces nicely !!

The only bummer here is that Envoy v1 is still active in our code. So you could localize your changes to a separate Docker image : proxyv2 - cc @costinm for guidance.

I do have one naive concern: cap_net_admin - till date proxy has been running with normal perms. This is gonna elevate the proxy’s perms which might raise some eyebrows. Thoughts on this?

What if we had a global option to decide: transparent proxy or redirect based proxy? That should alleviate some concerns.

@rshriram
Copy link
Member

/ok-to-test

@rlenglet
Copy link
Contributor Author

The only bummer here is that Envoy v1 is still active in our code.

I extended the Envoy v1 API to also add the transparent flag, in envoyproxy/envoy#2719. I will send another commit to set it in the v1 API.

@istio-merge-robot
Copy link

@rlenglet PR needs rebase

@istio-merge-robot istio-merge-robot added the needs-rebase Indicates a PR needs to be rebased before being merged label Mar 30, 2018
@istio-testing istio-testing removed the needs-rebase Indicates a PR needs to be rebased before being merged label Mar 30, 2018
@istio-testing istio-testing added the needs-rebase Indicates a PR needs to be rebased before being merged label Mar 30, 2018
@rshriram
Copy link
Member

I extended the Envoy v1 API to also add the transparent flag, in envoyproxy/envoy#2719. I will send another commit to set it in the v1 API.

That wont be necessary.. WE are dropping v1 in a month or so. Lets not add more stuff to envoy v1. and our v1 code will be in deprecated mode. WE can work around by having two docker containers (we are going to have that anyway).

@ayj
Copy link
Contributor

ayj commented Mar 30, 2018

First, thanks for working this all out. This change as security implications (see istio/old_issues_repo#172). At best, it should probably be configurable to avoid requiring more persistent (non-init) containers to run with NET_CAP_ADMIN.

It might also be good to update https://github.com/istio/istio/blob/master/pilot/doc/proxy-redirection-configuration.md to reflect the current design for network traffic capture.

cc @ldemailly

@kyessenov
Copy link
Contributor

kyessenov commented Mar 30, 2018

Thanks, this is cool! I suggest creating special flags to avoid issues with security and compatibility:

  1. CAP_NET_ADMIN for the proxy needs to be under control in the injection script (istioctl component and the webhook)
  2. tproxy flag for the iptables script, and how it plays with all other options (exclusions by CIDR ranges) -- this is init container component. Given that tproxy requires the same extra permissions as init container, we may consider folding the two containers into the sidecar.
  3. tproxy mode set at the control plane (pilot-discovery). There is a coordination problem here, and we should start with a global flag, I think.

@rlenglet
Copy link
Contributor Author

rlenglet commented Mar 30, 2018

OK, I'll look into making this configurable.
@kyessenov I agree that having a global flag is easier to get started with.

We may later look into notifying pilot whether the proxy is in tproxy mode or not by adding some flags into the xDS node ID. Not sure how that would play with v1 API though.

@kyessenov
Copy link
Contributor

Correct, xDS node ID is not fully worked out yet in istio, so I wouldn't venture into there for now. Making a global flag so that it's testable and does not interfere by default is preferred as the first step, we'll try to design APIs to incorporate that (a mesh config flag, a per proxy flag, and so on).

@ldemailly
Copy link
Member

apologies the vendor-ing is a bit painful

@rlenglet
Copy link
Contributor Author

rlenglet commented Apr 3, 2018

I'm in the process of making this configurable. I'm adding a TransparentProxy field into MeshConfig to switch to TPROXY for all sidecars mesh-wide.
Does that make sense? If not, what would be a better place to define this field?

@ldemailly
Copy link
Member

I don't think it should be mesh wide, though the default value can be meshwide

it should be controllable per deployment (istioctl kube-inject --proxy-mode=x for instance, which would turn into a init container flag, which people can adapt in their CI/CD systems)

@rlenglet
Copy link
Contributor Author

rlenglet commented Apr 4, 2018

I don't think it should be mesh wide, though the default value can be meshwide

it should be controllable per deployment (istioctl kube-inject --proxy-mode=x for instance, which would turn into a init container flag, which people can adapt in their CI/CD systems)

I am fine with that.

The reason I proposed to put this setting into MeshConfig is for consistency with proxy_listen_port. Both settings are of the same nature: they need to be passed to istio-iptables.sh to initialize the stack before proxy-agent is started, and they also need to be passed consistently to pilot-discovery to configure Listeners via LDS after Envoy has started.

If we decide to make this a per-proxy setting, then we must find a way for either pilot-agent or envoy to signal to pilot-discovery that Listeners must be set as transparent. Then we have only 2 mechanisms available:

  1. Extend ServiceInstance and all the implementations of ServiceDiscovery's GetProxyServiceInstances method to extract the transparent option for every proxy.
  2. Extend the Envoy node ID structure to add a 5th field for the transparent option.

My personal preference would be to extend the Envoy node ID, because it will work on all platforms. Extending ServiceInstance will require modifying all 8 current implementations of ServiceDiscovery.

However, if we decide later to be consistent and move other similar configuration settings to be per-proxy, especially proxy_listen_port, then I'm not sure modifying the Envoy node ID will be manageable.

@ldemailly which mechanism do you think is preferable?

@rlenglet
Copy link
Contributor Author

rlenglet commented Apr 4, 2018

Concretely, I'd propose extending Proxy with an extra Transparent field:

type Proxy struct {
	Type NodeType
	IPAddress string
	ID string
	Domain string
	Transparent bool
}

And I'd encode this into the node type field as something like sidecar+transparent or sidecar,mode=transparent instead of just sidecar for the default case.
That way, we'd still keep 4 parts in the node ID, and very little would need to be modified.
A priory only the functions in pilot/pkg/model/context.go.

@istio-testing istio-testing removed the needs-rebase Indicates a PR needs to be rebased before being merged label Apr 4, 2018
@rlenglet
Copy link
Contributor Author

Reverting the commit that enables TPROXY by default...

@rlenglet
Copy link
Contributor Author

rlenglet commented Apr 19, 2018

If you're willing to always run pilot-agent as root, IMHO the most portable solution is to have pilot-agent set the CAP_NET_ADMIN ambient capability then call syscall.Setuid(1337) before executing envoy.
I didn't want to go this route for now because it was more invasive to pilot-agent.

@rlenglet
Copy link
Contributor Author

The v1alpha3-v2 tests passed again with TPROXY disabled:

@rlenglet
Copy link
Contributor Author

I have defined a new sidecar.istio.io/interceptionMode annotation, which overrides the mesh-wide MeshConfig/ProxyConfig setting. I tested by hand with istioctl kube-inject that it works.

@rlenglet
Copy link
Contributor Author

@rlenglet
Copy link
Contributor Author

@costinm I'm still figuring out how to add a test for this into e2e. Is it OK if I implement the e2e test in another PR?

@rshriram
Copy link
Member

Yes do in separate PR

@rlenglet
Copy link
Contributor Author

@rshriram Is there anything else I should address before this can be merged?

@rshriram
Copy link
Member

Why is e2e pilot failing ? It’s a required test. So I can’t merge until it passes.

Add iptables as a dependency to the istio.deb package.

Signed-off-by: Romain Lenglet <romain@covalent.io>
Add iproute2 as dependency to the istio.deb package and the proxy_init
Docker image.
Add a "-m" command-line flag to istio-ipstables.sh to select the inbound
traffic interception mode ("REDIRECT" or "TPROXY").
Fix the usage doc for the other command-line options.

Signed-off-by: Romain Lenglet <romain@covalent.io>
Signed-off-by: Romain Lenglet <romain@covalent.io>
Signed-off-by: Romain Lenglet <romain@covalent.io>
Configure the redirection mode (redirect vs. tproxy) in ProxyConfig.
Pass the redirection mode to Pilot in the Node's metadata, in environment
variable ISTIO_META_INTERCEPTION_MODE.

Fix Envoy bootstrap to remove the ISTIO_META_ prefix from metadata
key names, instead of ISTIO_META.

Signed-off-by: Romain Lenglet <romain@covalent.io>
Define sidecar.istio.io/interceptionMode to override the
ProxyConfig.InterceptionMode mesh-wide setting.

Signed-off-by: Romain Lenglet <romain@covalent.io>
Fix pilot/pkg/kube/inject tests to use the new templates.
Add unit tests for the ProxyConfig.InterceptionMode.

Signed-off-by: Romain Lenglet <romain@covalent.io>
@rlenglet
Copy link
Contributor Author

ci/circleci: e2e-pilot failure:

--- FAIL: TestRoutes (116.53s)
    --- FAIL: TestRoutes/v1alpha1 (106.24s)
        --- FAIL: TestRoutes/v1alpha1/a->c[v1=100] (10.05s)
        	pilot_test.go:143: could not find operation "default-route" in zipkin traces
        --- PASS: TestRoutes/v1alpha1/a->c[v1=75,v2=25] (0.90s)
        --- PASS: TestRoutes/v1alpha1/a->c[v2=100]_header (2.84s)
        --- PASS: TestRoutes/v1alpha1/a->c[v2=100]_regex_header (1.10s)
        --- PASS: TestRoutes/v1alpha1/a->c[v1=100]_websocket (1.12s)
        --- PASS: TestRoutes/v1alpha1/a->c[v1=100]_append_headers (4.21s)
        --- FAIL: TestRoutes/v1alpha1/a->c[v1=100]_CORS_policy (11.51s)
        	pilot_test.go:143: could not find operation "default-route" in zipkin traces

@istio-testing
Copy link
Collaborator

istio-testing commented Apr 20, 2018

@rlenglet: The following test failed, say /retest to rerun them all:

Test name Commit Details Rerun command
prow/e2e-bookInfoTests-v1alpha3.sh b9f9c5d link /test e2e-bookInfo-envoyv2-v1alpha3

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@rshriram rshriram merged commit 0759c85 into istio:master Apr 20, 2018
@rlenglet
Copy link
Contributor Author

After rebasing, all required tests are passing.

@rlenglet rlenglet deleted the tproxy-support branch April 20, 2018 19:47
ozevren added a commit that referenced this pull request Apr 23, 2018
* Do not add jwt and authn filter for TCP listner type (they are http filters) (#5034)

* Improve virtual service validation (#5027)

Automatic merge from submit-queue.

Improve virtual service validation

Adds more tests to virtual service validation and fixes a few issues. This PR improves the coverage but more test cases need to be added.

* istioctl: fix default namespace handling for (de)register commands (#4493)

* istioctl: fix default namespace handling for (de)register commands

PersistentPreRun is only invoked for the leaf subcommand in the
command chain and parent PersistentPreRun are skipped. In case of
(de)register's PersistentPreRun, this skipped default namespace
handling. Fortunatly, (de)register was only calling getRealKubeConfig
which was already handled by the parent command.

* fix lint errors

* Removed duplicate core v1 import. (#4957)

Automatic merge from submit-queue.

Removed duplicate core v1 import.

* update the --grpc-host-identities=istio-ca to preserve the default behavior. (#4972)

Automatic merge from submit-queue.

update the --grpc-host-identities=istio-ca to preserve the default behavior.

We still need to set default value of --grpc-host-identities=istio-ca to support mesh expansion customer.

* Support multiple route rules versions in Bookinfo e2e tests (#4896)

* move route-rule-reviews-90-10 and route-rule-reviews-80-20 with all other routing rules

otherwise, complex logic will be required to test them on v1alpha3 and v1alpha2

* added v1alpha3 versions of route-rule-reviews-80-20/90-10

* add TestFlags to e2e test framework

* add reprocessRule

* split demo_test.go into demo_test.go and main_test.go

* refactor: extract getPreprocessedRulePath

* add TestFlags definition and initialization

* remove adding default rules from setUpDefaultRouting

* remove deleting default rules on testConfig cleanup

* remove adding default routing rule

* print the migration rate in TestVersionMigration

* add setting default rules in TestVersionMigration

* ignore an error in deleting a rule that was deleted before

ignore the error that will happen since the fifty rule redefines
"reviews-default" rule and is deleted

* add default rules to test version routing and test fault

* add handling of rules config versions

* refactor: extract allRules variable

* add reviewsDestinationRule for v1Alpha3

* Skip -> Skipf

* Remove forCA from CsrRequest. (#5018)

Automatic merge from submit-queue.

Remove ForCA from CsrRequest.

ForCA is not used by Citadel any more.

Instead, Citadel decides whether to sign certificate for workload or CA from the flag `sign-ca-certs`:
https://github.com/istio/istio/blob/master/security/cmd/istio_ca/main.go#L218

* Use pod IP instead of host IP (#4988)

Automatic merge from submit-queue.

Correct IP for pilot debug tool.

* Remove vendor files from .gitignore (#5048)

* update Go control plane (#5053)

Signed-off-by: Shriram Rajagopalan <shriramr@vmware.com>

* updated istio/api repo version (#5050)

* updated istio/api repo version

* code review comments

* Add myself to install/OWNERS (#5046)

Automatic merge from submit-queue.

Add myself to install/OWNERS

* cleanup unused files (#5042)

Automatic merge from submit-queue.

cleanup unused files

istio-pilot-e2e-v1alpha3 is not run anymore. istio-pilot-e2e-envoyv2-v1alpha3 replaced that test

* Don't build anything in the init phase (#5035)

Automatic merge from submit-queue.

Don't build anything in the init phase

make init shouldn't actually build any binary.
That was introduced in #4773.

* [Part2] Added `ImagePullSecrets` to `SidecarInjectionSpec` (#5002)

Automatic merge from submit-queue.

[Part2] Added `ImagePullSecrets` to `SidecarInjectionSpec`

This PR updated the test cases related to SidecarInjectionSpec.

Fixed #4870

/cc @ayj @yusuoh @linsun

* Mixer filter fixes (#5012)

* Add proxy instances to plugin input params

* Fix yet another slice handling issue

* Update mixer cluster names

* Fix mixer cluster addresses

* Fix mixer cluster addresses #2

* Put registry and secrets into a nodeagent package. (#5054)

Automatic merge from submit-queue.

Put registry and secrets into a nodeagent package.

Two sub-package under nodeagent/
- `registry/`, is to handle the workload pod creation, deletion, etc, contains interaction with flexvolumedriver.
- `secrets/`, is to handle the secrets management, containing envoy SDS API interaction.

* Fix pilot gRPC port in mTLS mode (#4998)

* Use 15011 for pilot gRPC port when mTLS enabled.

* Update bootstrap test.

* Add tls context to bootstrap v1 (ingress using this).

* Update bootstrap golden data.

* Add a prow test for bookinfo v1alpha3 route rules (#5049)

Automatic merge from submit-queue.

Add a prow test for bookinfo v1alpha3 route rules

* Sets up Pilot and remote cluster for multicluster (#4997)

Automatic merge from submit-queue.

Sets up Pilot and remote cluster for multicluster

This change creates a secret and configmap in order
to start pilot in mulitcluster mode.  It also creates
the necessary resources on the remote cluster to deploy
applications there.

* Update helm chart version to 0.8.0 (#5030)

* simple e2e test: fix error output and exit condition (#5060)

* [pilot] Some minor cleanup of bootstrap code (#5071)

Automatic merge from submit-queue.

[pilot] Some minor cleanup of bootstrap code

* Start GRPC server using native go stack, cleanup auth (#4867)

* Refactoring the init code for grpc.

* Merge cleanup

* Add the secure grpc port (also serving https)

* Revert cleanup

* Refactor and fix AZ retrieval, add test

* Change default since the tls-via-envoy uses that, remove verbose log

* Allow custom DNS names for pilot

* Panic if certs not found an policy requires it

* Setting the add to emtpty will disable the mtls listener

* Revert vendor again

* Fix test failure

* Typo

* Make sure previous logs are dumped, it seems pilot may crash

* Manual fix of fmt -c

* Better fix for 'prev log'

* Lint errors

* routes no longer working

* Mount certs to pilot pod

* Lint fix and revert pod logs, it's used for something else

* Format

* Add missing transitive dependency envoyproxy/go-control-plane (#5076)

Automatic merge from submit-queue.

Add missing transitive dependency envoyproxy/go-control-plane

Not entirely sure how these were missed previously. Regardless,
running `dep ensure` adds them to vendor (no changes to our lock
file since they're transitive).

* Remove EUC validation code (#5080)

Automatic merge from submit-queue.

Remove EUC validation code

Issue: #4744

* renamed e2e-bookInfoTests-v1alpha3.sh -> e2e-bookInfoTests-envoyv2-v1alpha3.sh (#5087)

Automatic merge from submit-queue.

rename e2e-bookInfoTests-v1alpha3.sh -> e2e-bookInfoTests-envoyv2-v1alpha3.sh

* Revert "[pilot] Some minor cleanup of bootstrap code (#5071)" (#5090)

This reverts commit d5fa2b7.

Conflicts:
	pilot/pkg/bootstrap/server.go

* Enable RBAC (#5082)

* Use zipkin 2.6.0 in istio. (#4726)

* Modernize istio-remote helm chart (#5083)

Automatic merge from submit-queue.

Modernize istio-remote helm chart

Modifies endpoints and services to match master
This PR further changes the Makefile target to use istio-${service}.istio-system
This PR further adds in the CA service and deploys it by default

* Remove gcloud docker calls (#5092)

Automatic merge from submit-queue.

Remove gcloud docker calls

Fixes #4797

* Add per proxy pilot querying (#5096)

* Add per proxy pilot querying
This is the final chunk of functionality for the base proxy-config command. It adds the ability to query Pilot for a specific proxy as well as the full mesh support.

* Linting...

* Correct the reference file path in galley (#5000)

* Add secret controller for multicluster (#5017)

* Vendor changes adding Informers and Listers

* Secret Controller code

* Linter detected issues

* Vendor update related sha change

* Adding final bits to the controller

* Fixing controller startup code

* Adding required RBAC rules to watch for secrets

* Refactor Cluster Store initialization place

* Fixing Unit test failure

* Fixing Unit test failure

* Addressing comments part #1

* Fixing Unit test

* Switching to different type of Informer

* Add create k8s_cr.Cluster object

* Fixing if statement

* Fixing lint error

* Cosmetic changes

* Fixing lint error

* Tests reproing 503s (was 404s) during routerule apply - with t.Skip() until we have fix (#1041)

Reproduces 3 classes of bugs. with t.Skip() for now/until they are fixed.

* Multicluster deployment of Apps on remote (#5099)

Automatic merge from submit-queue.

Multicluster deployment of Apps on remote

This change deploys the remote applications in a multicluster
test.   It alps fixes a couple issues with the remote.yaml
and a typo from a prior PR. It makes some fixes to match up
with PR5083

* Use iptables TPROXY instead of REDIRECT for inbound traffic (#4654)

* Pilot: Support running Envoy with CAP_NET_ADMIN to support TPROXY

Add iptables as a dependency to the istio.deb package.

Signed-off-by: Romain Lenglet <romain@covalent.io>

* Pilot: Support iptables TPROXY instead of REDIRECT for inbound traffic

Add iproute2 as dependency to the istio.deb package and the proxy_init
Docker image.
Add a "-m" command-line flag to istio-ipstables.sh to select the inbound
traffic interception mode ("REDIRECT" or "TPROXY").
Fix the usage doc for the other command-line options.

Signed-off-by: Romain Lenglet <romain@covalent.io>

* Fix deb/* Makefile targets

Signed-off-by: Romain Lenglet <romain@covalent.io>

* Pilot: Configure transparent proxy redirection from proxy config

Configure the redirection mode (redirect vs. tproxy) in ProxyConfig.
Pass the redirection mode to Pilot in the Node's metadata, in environment
variable ISTIO_META_INTERCEPTION_MODE.

Fix Envoy bootstrap to remove the ISTIO_META_ prefix from metadata
key names, instead of ISTIO_META.

Signed-off-by: Romain Lenglet <romain@covalent.io>

* Pilot: Parse Node Metadata and store it in Proxy

Signed-off-by: Romain Lenglet <romain@covalent.io>

* Update pilot/pkg/kube/inject tests

Fix pilot/pkg/kube/inject tests to use the new templates.
Add unit tests for the ProxyConfig.InterceptionMode.

Signed-off-by: Romain Lenglet <romain@covalent.io>

* Pilot: Define sidecar.istio.io/interceptionMode annotation

Define sidecar.istio.io/interceptionMode to override the
ProxyConfig.InterceptionMode mesh-wide setting.

Signed-off-by: Romain Lenglet <romain@covalent.io>

* added missing external service definition (#5094)

* Fix the node agent E2E test, manually tested. (#5063)

Automatic merge from submit-queue.

Fix the node agent E2E test, manually tested.

Fixed several things to get it work:
- Update outdated flags value.
- In `start_app.sh`, retain the node agent process log, instead just run it in background.
- Make sure the initial root and cert is loaded.

How to test this:
- `make docker && make docker.push`
- `go test -v  istio.io/istio/security/tests/integration/nodeAgentTest  --tag $(git log -1 --format="%H")  --hub gcr.io/<your-project> -kube-config ~/.kube/config --skip_cleanup`

We should also figure out how to not run `apt-get` install for every test run. Will follow up with key cert generation issue and then ensure it's stability before re-enabling it.

cc @wattli

* Bug fix in stackdriver adapter. (#5026)

Automatic merge from submit-queue.

stackdriver adapter bug fixes and clean up

Several bug fixes and cleanups in stackdriver adapter:

- add duration type into distribution processing, which is used for latency metrics.
- remove a duplicated layer of loop.
- remove metric kind override since now adapter could deal with not only custom metrics.
- remove a log line which overwhelms mixer logs.

* Only query the specific trace using the provided x-client-trace-id tag (#5066)

Automatic merge from submit-queue.

Only query the specific trace using the provided x-client-trace-id tag

This change should make the trace query more efficient as it should only retrieve the single required trace instance.

cc @kyessenov @nmittler 

Signed-off-by: Gary Brown <gary@brownuk.com>

* integrate circle ci with testgrid (#4649)

Automatic merge from submit-queue.

Integrate circle CI with Testgrid

The integration will start with mixer and simple e2e tests. Will expand to other jobs in subsequent PRs.

Results are now available on
https://k8s-testgrid.appspot.com/istio#circleci-e2e-mixer
https://k8s-testgrid.appspot.com/istio#circleci-e2e-simple

Those are test results from this PR exclusively. After this is merged, the results will be more interesting.

The `ci_to_gubernator` binary is built from istio/test-infra#769. Feel free to also take a look.

* Fixing postsubmit (#5104)

* Implement Citadel prometheus monitoring feature. (#5015)

Automatic merge from submit-queue.

Implement Citadel prometheus monitoring feature.

This monitoring feature exposes a service (port 9093) about Citadel status to prometheus.
Yaml files are changed in #5072.
Tests will be added shortly.

* let stackdriver adapter figure out project metadata by itself (#5057)

Automatic merge from submit-queue.

let stackdriver adapter figure out project metadata by itself

This will make stackdriver adapter config generalized and usable for different projects.

* Fix labelNames getting filled in stackdriver logging. (#5058)

Automatic merge from submit-queue.

Fix labelNames getting filled in stackdriver logging.

Added LabelNames in testdata/stackdriver.yaml file
Also, fixed that if label was not string, it was getting filled as null.

* Don't attempt to qualify the wildcard domain. (#5106)

* Don't attempt to qualify the wildcard domain.

* fmt

* pilot-agent: add a flag to disable internal telemetry (#5101)

Automatic merge from submit-queue.

pilot-agent: add a flag to disable internal telemetry

Enabled by default, but allows to turn off telemetry.

Signed-off-by: Kuat Yessenov <kuat@google.com>

* Add tcp proxy support for multi-cluster environment (#4694)

Automatic merge from submit-queue.

tcp proxy support in a multi-cluster environment.

Services need to maintain per cluster service IPs.  For sidecars running in a cluster, cluster-specific service IPs should be used to build destination_ip_list for envoy listeners.

* Add missing namespace to citadel template (#5108)

Automatic merge from submit-queue.

Add missing namespace to citadel template

* prune old version resources that no longer exist (#5107)

Automatic merge from submit-queue.

prune old version resources that no longer exist

* [vendor-change] CloudWatch Mixer adapter (#4617)

Automatic merge from submit-queue.

[vendor-change] CloudWatch Mixer adapter

Adding an adapter to send metrics to cloudwatch

* Enable Ingress/Egress gateways in Helm for bookinfo demos (#5120)

Automatic merge from submit-queue.

Enable Ingress/Egress gateways in Helm for bookinfo demos

* Consume labeled multicluster secrets on startup (#5117)

Automatic merge from submit-queue.

Consume labeled multicluster secrets on startup

This patch when run against istio.yaml or istio-auth.yaml
runs in the new config mode using only labels rather than
configmaps.  The configmap functionality can be removed in
0.9.

* Add a linter check to make sure types.go are generated. (#5110)

Automatic merge from submit-queue.

Add a linter check to make sure types.go are generated.

addresses #4418

* Remove outdated manifests from install/kubernetes (#4882)

* Remove orig_ manifests

* Remove istio-mixer-validator and istio-mixer-with-health-check manifests

* Remove unwanted manifests before archiving

* Remove istio-sidecar-injector.yaml from install/README.md

* Remove *one-namespace*.yaml from install/README.md

* Make helm-generated manifests overwrite updateVersion_orig.sh manifests
@wangyuanyuan777
Copy link

After rebasing, all required tests are passing.

Can you tell me: Tproxy configuration in e2e,how to config?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

10 participants