-
Notifications
You must be signed in to change notification settings - Fork 209
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
flake: allow-all/pod-to-world/http(s)-to-cilium-io
fails
#367
Comments
Bring back the DNS visibility annotation (466e8f1) that got reverted in PR #356. I reverted it because it depended on 07a161d which was causing issue #355. I updated the commit so that it no longer depends on 07a161d. Having DNS visibility might give us some additional info to debug #367. Signed-off-by: Jarno Rajahalme <[email protected]> Signed-off-by: Michi Mutsuzaki <[email protected]>
Bring back the DNS visibility annotation (466e8f1) that got reverted in PR #356. I reverted the commit because it depended on 07a161d which was causing issue #355. I modified the commit so that it no longer depends on 07a161d. Having DNS visibility might give us some additional info to debug #367. Signed-off-by: Jarno Rajahalme <[email protected]> Signed-off-by: Michi Mutsuzaki <[email protected]>
Seen the same on GKE with #364: https://github.com/cilium/cilium-cli/pull/364/checks?check_run_id=2903745040 |
Use [jenkins.]cilium.io for FQDN tests to reduce external dependencies. Ref: #367 Signed-off-by: Michi Mutsuzaki <[email protected]>
Use [jenkins.]cilium.io for FQDN tests to reduce external dependencies. Ref: #367 Signed-off-by: Michi Mutsuzaki <[email protected]>
Use [jenkins.]cilium.io for FQDN tests to reduce external dependencies. Ref: #367 Signed-off-by: Michi Mutsuzaki <[email protected]>
Use [jenkins.]cilium.io for FQDN tests to reduce external dependencies. Ref: #367 Signed-off-by: Michi Mutsuzaki <[email protected]>
#373 changed the connectivity tests to use |
this one is actually even worse, it looks like |
still happening with cilium.io: https://github.com/cilium/cilium-cli/actions/runs/1102848558 |
allow-all/pod-to-world/http-to-www-google
failsallow-all/pod-to-world/http(s)-to-cilium-io
fails
To avoid the interference [1][2] after running L7 proxy tests. [1]: cilium/cilium-cli#367 [2]: #17459 Signed-off-by: Martynas Pumputis <[email protected]>
To avoid the interference [1][2] after running L7 proxy tests. [1]: cilium/cilium-cli#367 [2]: #17459 Signed-off-by: Martynas Pumputis <[email protected]>
To avoid the interference [1][2] after running L7 proxy tests. [1]: cilium/cilium-cli#367 [2]: #17459 Signed-off-by: Martynas Pumputis <[email protected]>
To avoid the interference [1][2] after running L7 proxy tests. [1]: cilium/cilium-cli#367 [2]: #17459 Signed-off-by: Martynas Pumputis <[email protected]>
To avoid the interference [1][2] after running L7 proxy tests. [1]: cilium/cilium-cli#367 [2]: #17459 Signed-off-by: Martynas Pumputis <[email protected]>
This commit adds an option IPsec e2e upgrade test. The test does the following: * Install the latest stable release version of Cilium. * Run the CLI's connectivity tests. * Upgrade Cilium to a PR version. * Run the CLI's connectivity tests. * Downgrade to the previous version. * Run the CLI's connectivity tests. After each connectivity test case we flush CT to avoid the interference [1][2] after running L7 proxy tests. [1]: cilium/cilium-cli#367 [2]: #17459 The test runs pods which established long-lived connections. The test checks whether they are not interrupted during upgrade / downgrade. Signed-off-by: Martynas Pumputis <[email protected]>
This commit adds an option IPsec e2e upgrade test. The test does the following: * Install the latest stable release version of Cilium. * Run the CLI's connectivity tests. * Upgrade Cilium to a PR version. * Run the CLI's connectivity tests. * Downgrade to the previous version. * Run the CLI's connectivity tests. After each connectivity test case we flush CT to avoid the interference [1][2] after running L7 proxy tests. [1]: cilium/cilium-cli#367 [2]: #17459 The test runs pods which established long-lived connections. The test checks whether they are not interrupted during upgrade / downgrade. Signed-off-by: Martynas Pumputis <[email protected]>
This commit adds an option IPsec e2e upgrade test. The test does the following: * Install the latest stable release version of Cilium. * Run the CLI's connectivity tests. * Upgrade Cilium to a PR version. * Run the CLI's connectivity tests. * Downgrade to the previous version. * Run the CLI's connectivity tests. After each connectivity test case we flush CT to avoid the interference [1][2] after running L7 proxy tests. [1]: cilium/cilium-cli#367 [2]: #17459 The test runs pods which established long-lived connections. The test checks whether they are not interrupted during upgrade / downgrade. Signed-off-by: Martynas Pumputis <[email protected]>
This commit adds an option IPsec e2e upgrade test. The test does the following: * Install the latest stable release version of Cilium. * Run the CLI's connectivity tests. * Upgrade Cilium to a PR version. * Run the CLI's connectivity tests. * Downgrade to the previous version. * Run the CLI's connectivity tests. After each connectivity test case we flush CT to avoid the interference [1][2] after running L7 proxy tests. [1]: cilium/cilium-cli#367 [2]: #17459 The test runs pods which established long-lived connections. The test checks whether they are not interrupted during upgrade / downgrade. Signed-off-by: Martynas Pumputis <[email protected]>
[ upstream commit e695db5 ] This commit adds an option IPsec e2e upgrade test. The test does the following: * Install the latest stable release version of Cilium. * Run the CLI's connectivity tests. * Upgrade Cilium to a PR version. * Run the CLI's connectivity tests. * Downgrade to the previous version. * Run the CLI's connectivity tests. After each connectivity test case we flush CT to avoid the interference [1][2] after running L7 proxy tests. [1]: cilium/cilium-cli#367 [2]: #17459 The test runs pods which established long-lived connections. The test checks whether they are not interrupted during upgrade / downgrade. Signed-off-by: Martynas Pumputis <[email protected]>
[ upstream commit e695db5 ] This commit adds an option IPsec e2e upgrade test. The test does the following: * Install the latest stable release version of Cilium. * Run the CLI's connectivity tests. * Upgrade Cilium to a PR version. * Run the CLI's connectivity tests. * Downgrade to the previous version. * Run the CLI's connectivity tests. After each connectivity test case we flush CT to avoid the interference [1][2] after running L7 proxy tests. [1]: cilium/cilium-cli#367 [2]: #17459 The test runs pods which established long-lived connections. The test checks whether they are not interrupted during upgrade / downgrade. Backport NB: disabled the endpoint routes feature in the 3rd configuration, as the documented limitation was fixed only in >=v1.13. Signed-off-by: Martynas Pumputis <[email protected]>
[ upstream commit e695db5 ] This commit adds an option IPsec e2e upgrade test. The test does the following: * Install the latest stable release version of Cilium. * Run the CLI's connectivity tests. * Upgrade Cilium to a PR version. * Run the CLI's connectivity tests. * Downgrade to the previous version. * Run the CLI's connectivity tests. After each connectivity test case we flush CT to avoid the interference [1][2] after running L7 proxy tests. [1]: cilium/cilium-cli#367 [2]: #17459 The test runs pods which established long-lived connections. The test checks whether they are not interrupted during upgrade / downgrade. Backport NB: disabled the endpoint routes feature in the 3rd configuration, as the documented limitation was fixed only in >=v1.13. Signed-off-by: Martynas Pumputis <[email protected]>
[ upstream commit e695db5 ] This commit adds an option IPsec e2e upgrade test. The test does the following: * Install the latest stable release version of Cilium. * Run the CLI's connectivity tests. * Upgrade Cilium to a PR version. * Run the CLI's connectivity tests. * Downgrade to the previous version. * Run the CLI's connectivity tests. After each connectivity test case we flush CT to avoid the interference [1][2] after running L7 proxy tests. [1]: cilium/cilium-cli#367 [2]: #17459 The test runs pods which established long-lived connections. The test checks whether they are not interrupted during upgrade / downgrade. Signed-off-by: Martynas Pumputis <[email protected]>
[ upstream commit e695db5 ] This commit adds an option IPsec e2e upgrade test. The test does the following: * Install the latest stable release version of Cilium. * Run the CLI's connectivity tests. * Upgrade Cilium to a PR version. * Run the CLI's connectivity tests. * Downgrade to the previous version. * Run the CLI's connectivity tests. After each connectivity test case we flush CT to avoid the interference [1][2] after running L7 proxy tests. [1]: cilium/cilium-cli#367 [2]: #17459 The test runs pods which established long-lived connections. The test checks whether they are not interrupted during upgrade / downgrade. Backport NB: disabled the endpoint routes feature in the 3rd configuration, as the documented limitation was fixed only in >=v1.13. Signed-off-by: Martynas Pumputis <[email protected]>
[ upstream commit e695db5 ] This commit adds an option IPsec e2e upgrade test. The test does the following: * Install the latest stable release version of Cilium. * Run the CLI's connectivity tests. * Upgrade Cilium to a PR version. * Run the CLI's connectivity tests. * Downgrade to the previous version. * Run the CLI's connectivity tests. After each connectivity test case we flush CT to avoid the interference [1][2] after running L7 proxy tests. [1]: cilium/cilium-cli#367 [2]: #17459 The test runs pods which established long-lived connections. The test checks whether they are not interrupted during upgrade / downgrade. Backport NB: disabled the endpoint routes feature in the 3rd configuration, as the documented limitation was fixed only in >=v1.13. Signed-off-by: Martynas Pumputis <[email protected]>
Observed in #366 on EKS:
https://github.com/cilium/cilium-cli/pull/366/checks?check_run_id=2905226287
The flow logs indicate that a DNS request was made, but no TCP connection was ever established:
It's not clear why there was never any TCP outgoing connection from curl. Unfortunately we don't seem to collect any L7 flows which would give us more insight into what the DNS response was.
The text was updated successfully, but these errors were encountered: