Keith Mattix II
Keith Mattix II
We were able to get past this in Istio via a combination of alt_stat_name and the %UPSTREAM_CLUSTER_RAW% stream formatter 👍🏾
I agree with Steven: lack of service discovery config sent to a sidecar is NOT a security boundary. exportTo on its own doesn't even limit calling the service from a...
Not stale
How is istiod supposed to know whether a particular destination hostname is ambient or not?
@leosarra Oh nice; that would be great! /cc @jaellio
Actually, I think @jaellio already has a PR somewhere; maybe they look ~the same?
> We ensure the pod UID is in the snapshot as a first concern on Add, and only remove it on an explicit informer pod Remove - an Add failure...
Are you running with seLinux configured by any chance?
This is super helpful, thanks for sharing! Yeah it looks like AppArmor doesn't want istio-cni to have access to that directory despite it having CAP_SYS_PTRACE capabilities
Can you try setting the appArmor profile to Unconfined? https://kubernetes.io/docs/tutorials/security/apparmor/#securing-a-pod /cc @howardjohn