-
Notifications
You must be signed in to change notification settings - Fork 39.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[kube-proxy] Fix session affinity with local endpoints traffic #55519
[kube-proxy] Fix session affinity with local endpoints traffic #55519
Conversation
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: MrHohn, thockin Associated issue: 55429 The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these OWNERS Files:
You can indicate your approval by writing |
Automatic merge from submit-queue (batch tested with PRs 55561, 55519). If you want to cherry-pick this change to another branch, please follow the instructions here. |
@MrHohn Is the issue only when using an external LB? Isn't traffic via clusterIP and nodeport also vulnerable? Is this worth cherrypicking? |
@nicksardo In fact, check again and I think this will affect external traffic for nodePort as well. In cluster traffic (captured by CIDR Will attempt to cherrypick this to 1.8 and 1.7. |
cc @bowei Did a quick scan and haven't found other incompatible service feature with ESIPP. |
What this PR does / why we need it:
Set up session affinity rules in
svcXlbChain
over local endpoints. It is basically a mirror of what we set insvcChain
:kubernetes/pkg/proxy/iptables/proxier.go
Lines 1423 to 1433 in 012b085
Which issue(s) this PR fixes (optional, in
fixes #<issue number>(, fixes #<issue_number>, ...)
format, will close the issue(s) when PR gets merged):Fixes #55429
Special notes for your reviewer:
@nicksardo @bowei
Release note: