Uploaded image for project: 'Maistra'
  1. Maistra
  2. MAISTRA-1298

Document how to solve NetworkPolicy problems

XMLWordPrintable

    • Icon: Task Task
    • Resolution: Won't Do
    • Icon: Major Major
    • None
    • None
    • None

      Maistra operator creates NetworkPolicies in control plane and member namespaces to whitelist traffic between them. The problem is that we implicitly change OCP networking behaviour from allow-all to deny-by-default if we create the first NetworkPolicy resource in a namespace. Because of this, services previously exposed through an OpenShift Route might become unaccessible.

      We have to document that

      • traffic into the mesh must always go through the ingress-gateway for Istio to work properly
      • services external to the mesh should, if possible, always be deployed in separate namespaces that are not in any mesh
      • if services that are outside the mesh must reside in a namespace that is part of a mesh, users can label the Pods with maistra.io/expose-route: "true", which will make sure OpenShift Routes to these services still work

              Unassigned Unassigned
              dgrimm@redhat.com Daniel Grimm
              Votes:
              0 Vote for this issue
              Watchers:
              4 Start watching this issue

                Created:
                Updated:
                Resolved: