Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: NetworkPolicies of Control-Planes #1701

Open
wants to merge 2 commits into
base: main
Choose a base branch
from

Conversation

leoncamel
Copy link

What issue type does this pull request address? (keep at least one, remove the others)
/kind bugfix

What does this pull request do? Which issues does it resolve? (use resolves #<issue_number> if possible)
resolves #

This pull request will fix networkpolicies of control-planes. Since from v0.19.x, the control-plane will pack into single
pod. The issue is not obvious.

Please provide a short message that should be published in the vcluster release notes

We encounter a issue with v0.18.x + k8s. After some investigation from our team, we found
the rule to system's host-dns is missing.

And we look into several version, we think the networkpolicies should be fixed.

What else do we need to know?

Copy link

netlify bot commented Apr 17, 2024

Deploy Preview for vcluster-docs ready!

Built without sensitive environment variables

Name Link
🔨 Latest commit b7eb25e
🔍 Latest deploy log https://app.netlify.com/sites/vcluster-docs/deploys/662206e94c53390008b19405
😎 Deploy Preview https://deploy-preview-1701--vcluster-docs.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify site configuration.

- namespaceSelector:
matchLabels:
kubernetes.io/metadata.name: 'kube-system'
podSelector:
- podSelector:
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is this necessary? Since vCluster should only communicate with pods in the namespace kube-system and the labels k8s-app=kube-dns, this would change the logic to an OR and then basically allow communication with all pods in the kube-system namespace.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

OK. I misunderstand the grammar of NetworkPolicyEgressRule. Just revert back

- port: 53
protocol: UDP
- port: 53
protocol: TCP
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Since we already have the rule below that selects DNS in the kube-system namespace, why is this still required?

Copy link
Author

@leoncamel leoncamel Apr 19, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The previous NetworkPolicy vc-work-{{ .Release.Name }} will work on workload node based on its podSelector:

  podSelector:
    matchLabels:
      vcluster.loft.sh/managed-by: {{ .Release.Name }}

And, the control-plane of a vcluster still need to communicate host's kube-dns. That is why we want add this rule. And it did crash without this rule.

Meanwhile, the original version of first podSelector: {}, is too loose. We only need vcluster's control-plane to communicate necessary nodes, like:

        - podSelector:
            matchLabels:
              release: {{ .Release.Name }}

@@ -30,7 +30,7 @@ spec:
- ports:
- port: 443
- port: 8443
to:
- to:
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This changes logic from an and to an or, why is this required? This basically allows communication with all pods on port 443 and 8443 as well as all ports on the control-plane

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Same as previous one. I misunderstand the grammar of NetworkPolicyEgressRule. Just revert back

@FabianKramm
Copy link
Member

@leoncamel thanks for your PR! I posted a couple of comments, would be great if you could take a look.

@leoncamel
Copy link
Author

@FabianKramm I just revert two typos, and explain the main idea about adding udp/53 rule for control-plane.

@leoncamel
Copy link
Author

@FabianKramm Any comment on this?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants