Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: add ztunnel cni for ambient #1142

Draft
wants to merge 10 commits into
base: main
Choose a base branch
from

Conversation

sgettys
Copy link
Contributor

@sgettys sgettys commented Dec 20, 2024

Description

This PR enables Istio Ambient for all of UDS Core. This includes Waypoint for L7 routing. It's still in draft until the FIPS discussion around ztunnel images and until the CNI ipset fix is released

Related Issue

Fixes #

Relates to #

Type of change

  • Bug fix (non-breaking change which fixes an issue)
  • New feature (non-breaking change which adds functionality)
  • Other (security config, docs update, etc)

Steps to Validate

  • If this PR introduces new functionality to UDS Core or addresses a bug, please document the steps to test the changes.

Checklist before merging

@@ -0,0 +1,10345 @@
# Copyright 2024 The Kubernetes Authors.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Could we install these CRDs as a manifest in the zarf.yaml with a remote reference instead of copying them in here? May make it easier to maintain across upgrades.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Good idea, what will happen if the CRs are already installed in the cluster though? How can we deal with that? Or just assume that it won't be?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Good q - I think in general it wouldn't be a problem to "re-apply" the CRDs via zarf manifest, but it could cause issues with helm ownership metadata on the CRDs. We could use zarf actions to add metadata (labels/annotations) to the existing CRDs if they exist, or just ignore it and assume they won't already be present on the cluster. Since the gateway CRDs are not a standard part of k8s clusters I think we might be okay to just assume that they aren't already present in the cluster?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

That was my first thought as well but I wonder if they might come in to some later flavor of k8s as a built in. I don't think we'll run into any clusters that are using these in the wild though so we should be safe to assume they don't exist

Comment on lines 14 to +15
mtls:
mode: STRICT
mode: PERMISSIVE
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I missed this change earlier - what is the behavior with this set to STRICT? The way this behaves it would allow PERMISSIVE on all ports for the controller, I'd hope we could instead just set some ports to PERMISSIVE such as the two below here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants