-
Notifications
You must be signed in to change notification settings - Fork 337
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[iptables] Possibility to exclude port from iptables at control-plane level #7722
Comments
Isn't it just for one sidecar by annotation? I thought about - what if I want to disable one port for all pods in the cluster/zone |
Let me take this one |
So the initial idea is to enlarge the scope that a port-excluding rule can apply to. Is it better to apply this scope at the One other question would be, should we also support excluding ports for inbound traffic? The ports are taken into account by the
|
There's multiple issues in adding fields to the dataplane object:
I feel like either we should use a k8s only primitive or let users do this themselves with a webhook. One option could be to extend further ContainerPatch ? I know that there was another use case for adding volumes to pods systematically too. |
And by the way, it seems we currently do support a global configuration for Kubernetes based intallation:
See code in injector.go Does this match the requirement? @lukidzi |
This issue was inactive for 90 days. It will be reviewed in the next triage meeting and might be closed. |
@lukidzi can you answer @jijiechen question? |
@jijiechen You are right it seems to be supported with |
Description
It would be nice if you could exclude some ports from routing at the global level. Lets say your whole cluster needs to report metrics to service at port
8126
but it cannot go through sidecar. You could globally exclude this for each init container.The text was updated successfully, but these errors were encountered: