Uploaded image for project: 'Maistra'
  1. Maistra
  2. MAISTRA-2575

istio-proxy not running in 2.1

    XMLWordPrintable

Details

    • Bug
    • Resolution: Done
    • Blocker
    • maistra-2.1.0
    • maistra-2.1.0
    • None
    • None
    • Sprint 8

    Description

      When I test the latest 2.1 daily build on an OCP 4.7.23, all pods are running in the istio-system control plane. But there is no proxy running in data plane bookinfo pods.

      All bookinfo pods are waiting pilot :
      Envoy proxy is NOT ready: config not received from Pilot (is Pilot running?)

      (.env) $ oc get pod -n bookinfo
      NAME READY STATUS RESTARTS AGE
      details-v1-5447bb8796-9bfbk 1/2 Running 0 9m51s
      productpage-v1-57759c6b78-b7rnk 1/2 Running 0 9m50s
      ratings-v1-7dd8bcffdd-8dlb8 1/2 Running 0 9m51s
      reviews-v1-67474bb66d-85hds 1/2 Running 0 9m51s
      reviews-v2-6864ff7866-9jpgq 1/2 Running 0 9m51s
      reviews-v3-7647874b84-6jn7q 1/2 Running 0 9m50s
      (.env) $

      OpenShift version
      4.7.23
      View release notes
      Kubernetes version
      v1.20.0+558d959
      Channel
      stable-4.7

      istiod error logs:

      2021-08-10T14:56:08.134385Z	warn	ads	ADS:LDS: ACK ERROR sidecar~10.131.0.90~details-v1-5447bb8796-9bfbk.bookinfo~bookinfo.svc.cluster.local-3 Internal:Proto constraint validation failed (ListenerValidationError.FilterChains[i]: ["embedded message failed validation"] | caused by FilterChainValidationError.Filters[i]: ["embedded message failed validation"] | caused by FilterValidationError.Name: ["value length must be at least " '\x01' " runes"]): name: "172.30.221.53_443"
      address {
        socket_address {
          address: "172.30.221.53"
          port_value: 443
        }
      }
      filter_chains {
        filters {
        }
        filters {
          name: "envoy.filters.network.tcp_proxy"
          typed_config {
            [type.googleapis.com/envoy.extensions.filters.network.tcp_proxy.v3.TcpProxy] {
              stat_prefix: "outbound|443||istio-ingressgateway.istio-system.svc.cluster.local"
              cluster: "outbound|443||istio-ingressgateway.istio-system.svc.cluster.local"
            }
          }
        }
      }
      deprecated_v1 {
        bind_to_port {
        }
      }
      traffic_direction: OUTBOUND
      

      Attachments

        Issue Links

          Activity

            People

              yuaxu@redhat.com Yuanlin Xu
              yuaxu@redhat.com Yuanlin Xu
              Votes:
              0 Vote for this issue
              Watchers:
              5 Start watching this issue

              Dates

                Created:
                Updated:
                Resolved: