-
Notifications
You must be signed in to change notification settings - Fork 449
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
natOutgoing: true
seems to not work with private: true
#3408
Comments
@abravalheri, this is an expected behavior. When |
Hi @oilbeater thank you very much for the response. So is it correct to assume that it is not possible to allow the pods downloading things from the "general internet", but we need to know beforehand which CIDRs they need to access? I noticed the the docs mention that the |
ACLs can achieve this by manipulating the rules. You can use a drop rule to prevent traffic from other subnets with higher priority, followed by a low-priority rule that allows all traffic. |
Issues go stale after 60d of inactivity. Please comment or re-open the issue if you are still interested in getting this issue fixed. |
I have started working on a local update at the end of last week. We need to sort this out. Further, our Kube-OVN continues having stability problems. |
Issues go stale after 60d of inactivity. Please comment or re-open the issue if you are still interested in getting this issue fixed. |
Would it be possible to keep this issue open as a "Documentaiom" request? It would be nice if the docs contain an example of how to achieve this by manipulating the ACLs... I never managed to figure it out myself. |
Issues go stale after 60d of inactivity. Please comment or re-open the issue if you are still interested in getting this issue fixed. |
^^^ |
@abravalheri could you please help to post a PR to the kubeovn/doc about the issue? thanks! |
I can open an issue, but I can't open a PR unfortunately, because I don't know how to do it 😅. |
Issues go stale after 60d of inactivity. Please comment or re-open the issue if you are still interested in getting this issue fixed. |
Bug Report
The configuration
natOutgoing: true
seems to not work withprivate: true
for Subnets.If I create a subnet with both configurations, the pods in this subnet does not seem to be able to access an external address (making use of the NAT outgoing).
Expected Behavior
I would like to be able to combine
natOutgoing: true
withprivate: true
, so that internal isolation between the subnets is achieved, while also allowing the pods to access addresses on the internet (e.g. for downloading datasets) via NAT-ing (so that external internet addresses cannot initiate any connection with a pod inside the cluster).Actual Behavior
natOutgoing: true
seems to be ignored whenprivate: true
is set.Steps to Reproduce the Problem
natOutgoing
andprivate
:We can see that the
nw1-pod
cannot ping either the 8.8.8.8 address or thenw2-pod
.Additional Info
Kubernetes version:
Output of
kubectl version
:Installed via
microk8s
(sudo snap install microk8s --classic --channel=1.28
)kube-ovn version:
kubeovn/kube-ovn:v1.10.0 # image of kube-ovn-controller-...
installed via
microk8s
(microk8s enable kube-ovn
)operation-system/kernel version:
Output of
awk -F '=' '/PRETTY_NAME/ { print $2 }' /etc/os-release
:Output of
uname -r
:/cc @Chrisys93 @JuanMaParraU
The text was updated successfully, but these errors were encountered: