-
Notifications
You must be signed in to change notification settings - Fork 303
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Applying backend-config annotation on existing ingress service has no effect #1503
Comments
@bowei any idea about this? |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
Alternatively, we should be able to disable the default backend. Very few people want or are aware that ingress-gce forwards all unmatched external traffic to a pod in kube-system. This is undesirable from a security standpoint. |
/remove-lifecycle rotten |
Default backend can be removed when all of the products support a 404 response instead of requiring a Pod to 404. -- however, that seems to not be related to the issue title? |
We will take a look at this bug in the triage. |
Does this only impact CloudArmor config or any other config in BackendConfig? We had a problem with CloudArmor in that version you provided and it is since fixed. |
@mikouaj I have the same problem GKE : 1.21.5-gke.1302 |
Count me in on this problem as well. We can't seem to get a We use GKE Autopilot if that matters. {
"Major": "1",
"Minor": "20+",
"GitVersion": "v1.20.10-gke.1600",
"GitCommit": "ef8e9f64449d73f9824ff5838cea80e21ec6c127",
"GitTreeState": "clean",
"BuildDate": "2021-09-06T09:24:20Z",
"GoVersion": "go1.15.15b5",
"Compiler": "gc",
"Platform": "linux/amd64"
} |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/assign @spencerhance |
@bowei: GitHub didn't allow me to assign the following users: spencerhance. Note that only kubernetes members, repo collaborators and people who have commented on this issue/PR can be assigned. Additionally, issues/PRs can only have 10 assignees at the same time. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Ack |
/kind bug |
We are running to a similar issue. We're required to attach security policies to all exposed backends, including the ones created via/for default http backend. We're currently considering various "creative" solutions, but it would be a lot easier if it was fixed on the GCE Ingress level. Thanks for looking into it. |
Hi Folks, I attempted to repro this locally by adding a security policy and backendconfig to a service after the LB was provisioned - but I was unable to. If you share your redacted YAMLs or email your cluster info to the email on my profile I can take another look. |
@spencerhance thanks for your comment/verification. It does seem to work for default backends when they are attached to healthy Ingresses! For future reference the steps to have the policies attached to default backends.
just FYI, this process does not work for Ingresses which backends are in an unhealthy state |
@msuterski |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close |
@k8s-triage-robot: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
I'm getting a similar issue, but with a new |
Issue
Applying
cloud.google.com/backend-config
annotation on an existing service, that is associated with an existing Ingress, makes no changes on underlying backend service.Use cases
default-http-backend
inkube-system
name spaceBackendConfig
objectSteps to reproduce
Service
that matches some existing deploymentIngress
associated with the service created aboveBackendConfig
with Cloud Armor policy configuration (any other configuration will apply as well)cloud.google.com/backend-config
annotation pointing toBackendConfig
created in previous stepExpected Behavior
Cloud Armor policy is configured on a corresponding backend service
Actual Behavior
Nothing happens
GKE version
1.19.10-gke.1600
The text was updated successfully, but these errors were encountered: