-
Notifications
You must be signed in to change notification settings - Fork 123
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bump istio installation #1331
base: main
Are you sure you want to change the base?
Bump istio installation #1331
Conversation
/test check-provision-k8s-1.29 |
@aerosouund thanks for taking a crack at this! I am very keen to get this in. Do you need any help? The current version we are using is very old, and is not compatible with kubevirt/kubevirt#13422. The istio sidecar injection code is somehow stealing the cc @EdDev |
@mhenriks |
On inspecting the cluster post running [vagrant@node01 ~]$ sudo kubectl --kubeconfig=/etc/kubernetes/admin.conf api-resources | grep istio
wasmplugins extensions.istio.io/v1alpha1 true WasmPlugin
destinationrules dr networking.istio.io/v1 true DestinationRule
envoyfilters networking.istio.io/v1alpha3 true EnvoyFilter
gateways gw networking.istio.io/v1 true Gateway
proxyconfigs networking.istio.io/v1beta1 true ProxyConfig
serviceentries se networking.istio.io/v1 true ServiceEntry
sidecars networking.istio.io/v1 true Sidecar
virtualservices vs networking.istio.io/v1 true VirtualService
workloadentries we networking.istio.io/v1 true WorkloadEntry
workloadgroups wg networking.istio.io/v1 true WorkloadGroup
authorizationpolicies ap security.istio.io/v1 true AuthorizationPolicy
peerauthentications pa security.istio.io/v1 true PeerAuthentication
requestauthentications ra security.istio.io/v1 true RequestAuthentication
telemetries telemetry telemetry.istio.io/v1 true Telemetry With that said, the yaml files we use to install the operator will no longer work ( [vagrant@node01 ~]$ sudo kubectl --kubeconfig=/etc/kubernetes/admin.conf get pods -A | grep istio
istio-operator istio-operator-6c4fc4d784-2qqff 1/1 Running 0 2m50s
istio-system istio-egressgateway-79c995f7cb-w4ppg 1/1 Running 0 88s
istio-system istio-ingressgateway-775fdbc456-qq5cn 1/1 Running 0 88s
istio-system istiod-5857496459-cnz5t 1/1 Running 0 92s
kube-system istio-cni-node-l99td 1/1 Running 0 88s After the upgrade, you only get [vagrant@node01 ~]$ sudo kubectl --kubeconfig=/etc/kubernetes/admin.conf get pods -A | grep istio
istio-system istio-ingressgateway-5f9df778cc-bl9sw 1/1 Running 0 33m
istio-system istiod-69d6bb74c-z6fqk 1/1 Running 0 34m So we need to know how to get the same as what we had before in the previous version using 1.24. I might need help from the network team on this |
Alternatively, we may not jump to 1.24. Maybe a lesser version that still behaves similar to 1.15 and has the things you want supported. |
I am not familiar at all with Istio tbh, and currently on few other tasks, |
@oshoval
|
the first two need deeper understanding that i dont have now sorry, |
@mhenriks |
1.20 is the oldest version that supports 1.29 (SideCar featuregate enabled) so that would be the minimum. But obviously latest would be best https://istio.io/latest/docs/releases/supported-releases/#support-status-of-istio-releases |
It seem we dont use in in e2e tests, we do use ingress-gateway though Istio API
From what I remember Istio operator account for deploying its CNI, we have no dedicated scripting for doing that.
Please note kubevirt e2e tests relays on the sidecar injection functionally. I suggest to test this PR on kubevirt/kubevirt on sig-network lane so we can see where it fails and realize what our options. |
14a6949
to
ac32724
Compare
According to #1331 (comment) attached artifacts we see istio+passt tests are failing due to bug in Istio. |
CI runs very old version of Istio that does not support new k8s features and block development that utilize such features (e.g.: restart policy for init containers). The is an effort to upgrade Istio version CI use, but it fails due to because some Istio+passt tests failing [1]. Turn out VMs who's virt-laucher pod have Multus network annotation in JSON form doesn't work with newer version of Istio [2]. VM with passt binding plugin produce virt-laucher pod with Multus network annotation in JSON form. Quarantine istio+passt failing tests to unblock istio upgrade and development. Tracking issue for istio upgrade [3] [1] kubevirt/kubevirtci#1331 (comment) [2] istio/istio#54820 [3] kubevirt#13832 Signed-off-by: Or Mergi <[email protected]>
CI runs very old version of Istio that does not support new k8s features and block development that utilize such features (e.g.: restart policy for init containers). The is an effort to upgrade Istio version CI use, but it fails due to because some Istio+passt tests failing [1]. Turn out VMs who's virt-laucher pod have Multus network annotation in JSON form doesn't work with newer version of Istio [2]. VM with passt binding plugin produce virt-laucher pod with Multus network annotation in JSON form. Quarantine istio+passt failing tests to unblock istio upgrade and development. Tracking issue for istio upgrade [3] [1] kubevirt/kubevirtci#1331 (comment) [2] istio/istio#54820 [3] kubevirt#13832 Signed-off-by: Or Mergi <[email protected]>
CI runs very old version of Istio that does not support new k8s features and block development that utilize such features (e.g.: restart policy for init containers). The is an effort to upgrade Istio version CI use, but it fails due to because some Istio+passt tests failing [1]. Turn out VMs who's virt-laucher pod have Multus network annotation in JSON form doesn't work with newer version of Istio [2]. VM with passt binding plugin produce virt-laucher pod with Multus network annotation in JSON form. Quarantine istio+passt failing tests to unblock istio upgrade and development. Tracking issue for istio upgrade [3] [1] kubevirt/kubevirtci#1331 (comment) [2] istio/istio#54820 [3] kubevirt#13832 Signed-off-by: Or Mergi <[email protected]>
CI runs very old version of Istio that does not support new k8s features and block development that utilize such features (e.g.: restart policy for init containers). The is an effort to upgrade Istio version CI use, but it fails due to because some Istio+passt tests failing [1]. Turn out VMs who's virt-laucher pod have Multus network annotation in JSON form doesn't work with newer version of Istio [2]. VM with passt binding plugin produce virt-laucher pod with Multus network annotation in JSON form. Quarantine istio+passt failing tests to unblock istio upgrade and development. Tracking issue for istio upgrade [3] [1] kubevirt/kubevirtci#1331 (comment) [2] istio/istio#54820 [3] kubevirt#13832 Signed-off-by: Or Mergi <[email protected]>
CI runs very old version of Istio that does not support new k8s features and block development that utilize such features (e.g.: restart policy for init containers). The is an effort to upgrade Istio version CI use, but it fails due to because some Istio+passt tests failing [1]. Turn out VMs who's virt-laucher pod have Multus network annotation in JSON form doesn't work with newer version of Istio [2]. VM with passt binding plugin produce virt-laucher pod with Multus network annotation in JSON form. Quarantine istio+passt failing tests to unblock istio upgrade and development. Tracking issue for istio upgrade [3] [1] kubevirt/kubevirtci#1331 (comment) [2] kubevirt#13927 [3] kubevirt#13832 Signed-off-by: Or Mergi <[email protected]>
Hi, I managed to make istio 1.24.3 work with the following config:
Missing part was setting Isito CNI pods with seLinuxOptions spc_t, following discussion at istio/istio#54815 |
@ormergi |
I prefer newer version, but if its a trouble we can start with 1.23 |
Signed-off-by: aerosouund <[email protected]>
Signed-off-by: aerosouund <[email protected]>
Signed-off-by: aerosouund <[email protected]>
Signed-off-by: aerosouund <[email protected]>
Signed-off-by: aerosouund <[email protected]>
…er privileges are needed Signed-off-by: aerosouund <[email protected]>
Signed-off-by: aerosouund <[email protected]>
Signed-off-by: aerosouund <[email protected]>
…onset in a separate thread Signed-off-by: aerosouund <[email protected]>
Signed-off-by: aerosouund <[email protected]>
Signed-off-by: aerosouund <[email protected]>
Signed-off-by: aerosouund <[email protected]>
- Use 1.24.1 - Include config with security issue fixed Signed-off-by: aerosouund <[email protected]>
8616f8e
to
d9eec16
Compare
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
CI runs very old version of Istio that does not support new k8s features and block development that utilize such features (e.g.: restart policy for init containers). The is an effort to upgrade Istio version CI use, but it fails due to because some Istio+passt tests failing [1]. Turn out VMs who's virt-laucher pod have Multus network annotation in JSON form doesn't work with newer version of Istio [2]. VM with passt binding plugin produce virt-laucher pod with Multus network annotation in JSON form. Quarantine istio+passt failing tests to unblock istio upgrade and development. Tracking issue for istio upgrade [3] [1] kubevirt/kubevirtci#1331 (comment) [2] kubevirt#13927 [3] kubevirt#13832 Signed-off-by: Or Mergi <[email protected]>
CI runs very old version of Istio that does not support new k8s features and block development that utilize such features (e.g.: restart policy for init containers). The is an effort to upgrade Istio version CI use, but it fails due to because some Istio+passt tests failing [1]. Turn out VMs who's virt-laucher pod have Multus network annotation in JSON form doesn't work with newer version of Istio [2]. VM with passt binding plugin produce virt-laucher pod with Multus network annotation in JSON form. Quarantine istio+passt failing tests to unblock istio upgrade and development. Tracking issue for istio upgrade [3] [1] kubevirt/kubevirtci#1331 (comment) [2] kubevirt#13927 [3] kubevirt#13832 Signed-off-by: Or Mergi <[email protected]>
/retest-required |
CI runs very old version of Istio that does not support new k8s features and block development that utilize such features (e.g.: restart policy for init containers). The is an effort to upgrade Istio version CI use, but it fails due to because some Istio+passt tests failing [1]. Turn out VMs who's virt-laucher pod have Multus network annotation in JSON form doesn't work with newer version of Istio [2]. VM with passt binding plugin produce virt-laucher pod with Multus network annotation in JSON form. Quarantine istio+passt failing tests to unblock istio upgrade and development. Tracking issue for istio upgrade [3] [1] kubevirt/kubevirtci#1331 (comment) [2] kubevirt#13927 [3] kubevirt#13832 Signed-off-by: Or Mergi <[email protected]>
@aerosouund: The following tests failed, say
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
What this PR does / why we need it:
Bump Istio to the latest stable release
Which issue(s) this PR fixes (optional, in
fixes #<issue number>(, fixes #<issue_number>, ...)
format, will close the issue(s) when PR gets merged):Fixes #1324
Checklist
This checklist is not enforcing, but it's a reminder of items that could be relevant to every PR.
Approvers are expected to review this list.