-
Notifications
You must be signed in to change notification settings - Fork 7.9k
istio issues on gke via gateway api #55932
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
@howardjohn @costinm I saw your comments on the above links, |
You said |
@howardjohn When I try to access the webapp url externally , it doesnt work. i also tried the gcp's flavour of gateway api, but that requires a lot more changes in our infra (mandatory to use proxy only subnet) Below manifest i tried, apiVersion: gateway.networking.k8s.io/v1beta1
|
since you are making it an "internal" type it's not accessible outside your vpc |
In aks also in using similar annotations service.beta.kubernetes.io/azure-load-balancer-internal: "true" service.beta.kubernetes.io/port_80_health_probe_port: 15021 |
I don't know much about Azure and I haven't worked on GCP in a while. I am confident the setting you configured means "not reachable outside of VPC" though. Either way, if you can reach the internal IP but not the external one this is a GCP issue ,not an Istio one.. pretty sure its the |
@howardjohn im not saying its an istio issue :) |
Is this the right place to submit this?
Bug Description
We are facing an issue when trying to expose our internal application via gateway api on GKE, same setup is working fine on Azure aks cluster.
Azure we are using istio ambient 1.24.1 , however, on gke we have installed same version of istio but default profile with sidecar enabled.
Additionally, we are using a revision based istio approach.
In aks we are using below annotations to rewrite the health probe request paths, protocol and port,
internal communication is working fine, i can reach my application service from within istio-gateway pods fine
working fine
do we have similar configurations for gke as well?
I did look for similar issues or articles in github and noticed that we can follow a cm based approach to pass custom configurations to our gateway api setup?
can you help us with some more detail here?
Gateway manifest:
apiVersion: gateway.networking.k8s.io/v1
kind: Gateway
metadata:
name: istio-gateway
namespace: istio-system
annotations:
networking.gke.io/load-balancer-type: "Internal"
spec:
gatewayClassName: istio
addresses:
type: IPAddress
listeners:
hostname: "*."
port: 80
protocol: HTTP
allowedRoutes:
namespaces:
from: Selector
selector:
matchLabels:
# shared-gateway-access: "true"
istio.io/rev: default
hostname: "*."
port: 443
protocol: HTTPS
allowedRoutes:
namespaces:
from: Selector
selector:
matchLabels:
# shared-gateway-access: "true"
istio.io/rev: default
tls:
mode: Terminate
certificateRefs:
kind: Secret
name:
Gateway AKS:
apiVersion: gateway.networking.k8s.io/v1
kind: Gateway
metadata:
annotations:
service.beta.kubernetes.io/azure-load-balancer-health-probe-request-path: /healthz/ready
service.beta.kubernetes.io/azure-load-balancer-internal: "true"
service.beta.kubernetes.io/port_80_health-probe_port: "15021"
service.beta.kubernetes.io/port_80_health-probe_protocol: http
service.beta.kubernetes.io/port_443_health-probe_port: "15021"
service.beta.kubernetes.io/port_443_health-probe_protocol: http
name: istio-gateway
namespace: istio-system
labels:
istio.io/rev: ambient-trace
spec:
addresses:
value:
gatewayClassName: istio
listeners:
port: 80
protocol: HTTP
allowedRoutes:
namespaces:
from: Selector
selector:
matchLabels:
# shared-gateway-access: "true"
istio.io/dataplane-mode: ambient-trace
hostname: "*" # Ensure this hostname is appropriate for your AKS environment
port: 443
protocol: HTTPS
allowedRoutes:
namespaces:
from: Selector
selector:
matchLabels:
# shared-gateway-access: "true"
istio.io/dataplane-mode: ambient-trace
tls:
certificateRefs:
kind: Secret
name:
mode: Terminate
Version
Additional Information
For azure i followed this,
https://cloud-provider-azure.sigs.k8s.io/topics/loadbalancer/#custom-load-balancer-health-probe
for GCP i found the below links,
istio/api#3400
#55283
The text was updated successfully, but these errors were encountered: