Replies: 1 comment 5 replies
-
The istio-cni plugin should be adding some iptables config which allows health probes. This doc on istio.io has a high level explanation of how it works and interacts with kube netpol. By the sounds of your post, these rules aren't configured (or are being stripped perhaps?) resulting in kube health check traffic getting treated as "normal" inbound where STRICT peer auth causes it to be rejected. |
Beta Was this translation helpful? Give feedback.
5 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
I am a little bit puzzled because sometimes documentation is exclusively for the sidecar-mode, but not declared as such.
I am using Istio ambient 1.26.0 to secure a namespace including two deployments.
All traffic should be encrypted, but as soon as I enable PeerAuthentication liveness and readiness probes are not able to reach the pod. Ist this intended behavior? How can I still use the probes while forcing all the other traffic to be encrypted?
Same with AuthorizationPolicy:
I would like to restrict access to this service to the namespace. NetworkPolicy could be also used for this. After enabling this the probes or not probing anymore.
I tried adding an exception for the /health endpoint or the kubelets ip but still no probes.
I have found and read https://istio.io/latest/docs/ops/configuration/mesh/app-health-check/ but this seems to be a sidecar-only article.
I have found https://istio.io/latest/about/faq/security/#k8s-health-checks and probe rewrite still seems to be a sidecar-only thing.
Beta Was this translation helpful? Give feedback.
All reactions