-
Bug
-
Resolution: Obsolete
-
Major
-
None
-
maistra-2.1.0
-
None
-
False
-
False
-
User Experience
-
Bug Description
We uses maistra servisemesh under openshift 4.7, and we saw a strange behavior.
If a deployment have the following annotations{}
spec: template: metadata: annotations: sidecar.istio.io/inject: 'true' sidecar.istio.io/rewriteAppHTTPProbers: 'true' traffic.sidecar.istio.io/excludeOutboundIPRanges: 0.0.0.0/0
{{}}
{{}}
We need the traffic.sidecar.istio.io/excludeOutboundIPRanges: 0.0.0.0/0 annotation.
The namespace serviceEntry rules will block the egress communications. But if a domain not exists inside the serviceEntry it can pass through. So the serviceEntry allow rule will be a domain blacklist.
We uses the following ServiceMeshControlPlane:
apiVersion: maistra.io/v2 kind: ServiceMeshControlPlane metadata: name: basic namespace: istio-system spec: proxy: networking: trafficControl: inbound: {} outbound: policy: REGISTRY_ONLY security: controlPlane: tls: minProtocolVersion: TLSV1_2 mtls: true dataPlane: mtls: true version: v2.1 gateways: enabled: true egress: enabled: true ingress: enabled: true
{{}}
It's a planned behavior?
Thank you!
Versions
{{Istio:
client version: 1.9.3
control plane version: OSSM_2.1.0-5.el8
data plane version: 1.9.8 (55 proxies)
Kubectl:
Client Version: v1.22.4
Server Version: v1.20.10+bbbc079
OC:
Client Version: 4.7.2
Server Version: 4.7.37
Kubernetes Version: v1.20.10+bbbc079
maistra:
maistra/v2
version: v2.1}}