-
Notifications
You must be signed in to change notification settings - Fork 103
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Investigate DNS proxy port bind issues #1272
Comments
Sorry for the vague comment on slack - I am not sure I agree, I would actually prefer if we bound to localhost for 15001 almost as well. The only legitimate place to connect to these is from the local pod. if we expose it externally, we can/will have users able to do At the very least, we would need to add a similar check for DNS |
Yes, agreed on both. If I avoid localhost, a prerequisite of doing so would be mitigating this without code hacks. DNS lookups don't happen from the pod netns anyway, so this should be preventable with an iptables rule. From the perspective of the iptables rules we really don't care what the bound address is, I'm mostly trying to understand how it can happen for localhost binds specifically. |
this error looks similar kubernetes/ingress-nginx#2904 |
Which might explain why restarts fix it but retries do not, as presumably Seems like options are
We could just do the former tho, if we want? I guess it's not so much different from the kernel support detection we do already. |
Closing as this turned out to be an issue on our end (which using UNSPECIFIED addr would have elided, but no need to do so, as long as it isn't needed to work around platform quirks) |
Reference: https://istio.slack.com/archives/C37A4KAAD/p1724148926299219
The text was updated successfully, but these errors were encountered: