Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

default Istio outbound traffic mode usage #87

Open
2 tasks
zivnevo opened this issue Jul 25, 2024 · 0 comments
Open
2 tasks

default Istio outbound traffic mode usage #87

zivnevo opened this issue Jul 25, 2024 · 0 comments
Labels

Comments

@zivnevo
Copy link
Member

zivnevo commented Jul 25, 2024

  • consider adding a warning when the default Istio outbound traffic mode (ALLOW_ANY) is used in the absence of sidecar resources (and it adds connectivity to dns peers for example)
  • Should serviceEntry (dns) peers be excluded from analysis in certain cases? e.g. kube-system pods are generally not part of the istio mesh

IBM/network-config-analyzer#476 (comment)

IBM/network-config-analyzer#476 (comment)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

1 participant