-
Notifications
You must be signed in to change notification settings - Fork 30
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Network policy blocks established connections to RDS #236
Comments
Here the pod attempted to start a connection before NP enforcement and hence response packet is dropped. Pl refer to this #189 (comment) for detailed explanation. Our recommended solution for this is Other option if you don't want to enable this mode is to allow Service CIDRs given that your pods communicate via Service vips and this will allow return traffic.. |
@Mohilpalav Did Strict mode help with your use case/issue? |
@Mohilpalav Is there any solution for this issue? |
Hello there, we have the same problem, connecting to RDS service from a pod, but also when contacting the S3 service. Did you find any solution to this problem? |
Hello there, we found a workaround here. Using the |
In my case ANNOTATE_POD_IP has not helped really. Randomly pods have issues to esatablish networkconnections (e.g. after restarts), although it has worked before the restart. |
@Mohilpalav Were you able to try the strict mode and did that help with your issue ? |
We are actively working on the fix for this issue. Fix can be tracked here #345 Closing this issue. Please follow above issue for the fix |
What happened:
We have a workload running in an EKS cluster which makes a request to an RDS cluster on startup. This request is blocked by the Network policy despite having an egress rule to the RDS cluster subnet from that workload. We suspect that the outbound connection goes through before the network policy node agent starts tracking the connections, and when the response is received the node agent doesn't have the known allowed connection to match due to which the traffic gets denied.
This is what we can see in the network policy flow logs:
10.47.53.151:5432-> RDS
10.27.36.181 -> EKS workload
Unfortunately, the node agent logs only show this at the moment #103:
What you expected to happen:
The connection to RDS should be allowed.
How to reproduce it (as minimally and precisely as possible):
Anything else we need to know?:
Similar issues:
#73
#186
Environment:
kubectl version
): v1.28cat /etc/os-release
): Amazon Linux 2uname -a
): 5.10.210-201.852.amzn2.x86_64The text was updated successfully, but these errors were encountered: