You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
According to our meeting discussion, we should do the following to tackle this problem
Waiting for all the xds cache synced, before starting the rbac module, by that it doesnot solve this problem directly, but will prevent data inconsistence after restart.
Add a flag to indicate whether a workkload has bounded auth policy, only call userspace when it has.
For the immediate fix, should we allow the packet pass if no destination workload found or keep deny.
What happened:
When I try to fix #1192 , I find a lot of 503 issues:
By capturing the packet, I found that the waypoint received a TCP RST. After investigation, it was because Kmesh RBAC rule was triggered.
Although I didn't deploy any auth policy, XDP will still pass the packet to the userspace for checking.
If Kmesh has just been restarted and has not yet sync with istio, it may cause rbac deny, ref: https://github.com/kmesh-net/kmesh/blob/main/pkg/auth/rbac.go#L184
What you expected to happen:
If no auth policy is configured, then xdp should not send the packet to user space for rbac check?
And we should also consider the situation that if Kmesh is restarted and has not yet sync completely with istio, but auth processing is triggered.
cc @supercharge-xsy @weli-l
How to reproduce it (as minimally and precisely as possible):
Anything else we need to know?:
Environment:
Kernel-Native Mode
andDuel-Engine Mode
):The text was updated successfully, but these errors were encountered: