-
Notifications
You must be signed in to change notification settings - Fork 123
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bump istio installation #1331
base: main
Are you sure you want to change the base?
Bump istio installation #1331
Conversation
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/test check-provision-k8s-1.29 |
@aerosouund thanks for taking a crack at this! I am very keen to get this in. Do you need any help? The current version we are using is very old, and is not compatible with kubevirt/kubevirt#13422. The istio sidecar injection code is somehow stealing the cc @EdDev |
@mhenriks |
On inspecting the cluster post running [vagrant@node01 ~]$ sudo kubectl --kubeconfig=/etc/kubernetes/admin.conf api-resources | grep istio
wasmplugins extensions.istio.io/v1alpha1 true WasmPlugin
destinationrules dr networking.istio.io/v1 true DestinationRule
envoyfilters networking.istio.io/v1alpha3 true EnvoyFilter
gateways gw networking.istio.io/v1 true Gateway
proxyconfigs networking.istio.io/v1beta1 true ProxyConfig
serviceentries se networking.istio.io/v1 true ServiceEntry
sidecars networking.istio.io/v1 true Sidecar
virtualservices vs networking.istio.io/v1 true VirtualService
workloadentries we networking.istio.io/v1 true WorkloadEntry
workloadgroups wg networking.istio.io/v1 true WorkloadGroup
authorizationpolicies ap security.istio.io/v1 true AuthorizationPolicy
peerauthentications pa security.istio.io/v1 true PeerAuthentication
requestauthentications ra security.istio.io/v1 true RequestAuthentication
telemetries telemetry telemetry.istio.io/v1 true Telemetry With that said, the yaml files we use to install the operator will no longer work ( [vagrant@node01 ~]$ sudo kubectl --kubeconfig=/etc/kubernetes/admin.conf get pods -A | grep istio
istio-operator istio-operator-6c4fc4d784-2qqff 1/1 Running 0 2m50s
istio-system istio-egressgateway-79c995f7cb-w4ppg 1/1 Running 0 88s
istio-system istio-ingressgateway-775fdbc456-qq5cn 1/1 Running 0 88s
istio-system istiod-5857496459-cnz5t 1/1 Running 0 92s
kube-system istio-cni-node-l99td 1/1 Running 0 88s After the upgrade, you only get [vagrant@node01 ~]$ sudo kubectl --kubeconfig=/etc/kubernetes/admin.conf get pods -A | grep istio
istio-system istio-ingressgateway-5f9df778cc-bl9sw 1/1 Running 0 33m
istio-system istiod-69d6bb74c-z6fqk 1/1 Running 0 34m So we need to know how to get the same as what we had before in the previous version using 1.24. I might need help from the network team on this |
Alternatively, we may not jump to 1.24. Maybe a lesser version that still behaves similar to 1.15 and has the things you want supported. |
I am not familiar at all with Istio tbh, and currently on few other tasks, |
@oshoval
|
the first two need deeper understanding that i dont have now sorry, |
@mhenriks |
1.20 is the oldest version that supports 1.29 (SideCar featuregate enabled) so that would be the minimum. But obviously latest would be best https://istio.io/latest/docs/releases/supported-releases/#support-status-of-istio-releases |
It seem we dont use in in e2e tests, we do use ingress-gateway though Istio API
From what I remember Istio operator account for deploying its CNI, we have no dedicated scripting for doing that.
Please note kubevirt e2e tests relays on the sidecar injection functionally. I suggest to test this PR on kubevirt/kubevirt on sig-network lane so we can see where it fails and realize what our options. |
14a6949
to
ac32724
Compare
Signed-off-by: aerosouund <[email protected]>
08eda91
to
3a5b5f1
Compare
@ormergi Thanks alot for your help on this
Acknowledged, thanks.
Not sure i quite follow through but in general i will test this on kubevirtCI and check if it produces the desired results |
Hey @aerosouund , I was wondering what the status of this one is? Have you tried with istio 1.23? |
No |
I can try and help to get a provider published once the changes are in place and we can test it against the actual CI environment to see how it looks. |
Signed-off-by: aerosouund <[email protected]>
Signed-off-by: aerosouund <[email protected]>
Signed-off-by: Ammar Yasser <[email protected]>
Signed-off-by: aerosouund <[email protected]>
@aerosouund: The following tests failed, say
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
I published a provider for this and ran the network e2e suite against it - it looks like the istio tests are still failing against this updated version. Attaching the artifacts from the run: The images should be available from my quay repo |
PR needs rebase. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
It seems tests that verifies Isito & passt binding plugin are failing, tests that verifies masquerade binding pass.
Last time I ran these tests with newer istio they passed, I never saw such failures before tbh. I will try to reproduce it with the images you mentioned and update. |
CI runs very old version of Istio that does not support new k8s features and block development that utilize such features (e.g.: restart policy for init containers). The is an effort to upgrade Istio version CI use, but it fails due to because some Istio+passt tests failing. Turn out VMs who's virt-laucher pod have Multus network annotation in JSON form doesn't work with newer version of Istio [1]. Quarantine istio+passt failing tests to unblock istio upgrade and development. Tracking issue for istio upgrade [2] [1] istio/istio#54815 [2] kubevirt/kubevirtci#1331 Signed-off-by: Or Mergi <[email protected]>
CI runs very old version of Istio that does not support new k8s features and block development that utilize such features (e.g.: restart policy for init containers). The is an effort to upgrade Istio version CI use, but it fails due to because some Istio+passt tests failing [1]. Turn out VMs who's virt-laucher pod have Multus network annotation in JSON form doesn't work with newer version of Istio [2]. Quarantine istio+passt failing tests to unblock istio upgrade and development. Tracking issue for istio upgrade [3] [1] kubevirt/kubevirtci#1331 (comment) [2] istio/istio#54815 [3] kubevirt#13832 Signed-off-by: Or Mergi <[email protected]>
According to #1331 (comment) attached artifacts we see istio+passt tests are failing due to bug in Istio. |
CI runs very old version of Istio that does not support new k8s features and block development that utilize such features (e.g.: restart policy for init containers). The is an effort to upgrade Istio version CI use, but it fails due to because some Istio+passt tests failing [1]. Turn out VMs who's virt-laucher pod have Multus network annotation in JSON form doesn't work with newer version of Istio [2]. VM with passt binding plugin produce virt-laucher pod with Multus network annotation in JSON form. Quarantine istio+passt failing tests to unblock istio upgrade and development. Tracking issue for istio upgrade [3] [1] kubevirt/kubevirtci#1331 (comment) [2] istio/istio#54820 [3] kubevirt#13832 Signed-off-by: Or Mergi <[email protected]>
CI runs very old version of Istio that does not support new k8s features and block development that utilize such features (e.g.: restart policy for init containers). The is an effort to upgrade Istio version CI use, but it fails due to because some Istio+passt tests failing [1]. Turn out VMs who's virt-laucher pod have Multus network annotation in JSON form doesn't work with newer version of Istio [2]. VM with passt binding plugin produce virt-laucher pod with Multus network annotation in JSON form. Quarantine istio+passt failing tests to unblock istio upgrade and development. Tracking issue for istio upgrade [3] [1] kubevirt/kubevirtci#1331 (comment) [2] istio/istio#54820 [3] kubevirt#13832 Signed-off-by: Or Mergi <[email protected]>
CI runs very old version of Istio that does not support new k8s features and block development that utilize such features (e.g.: restart policy for init containers). The is an effort to upgrade Istio version CI use, but it fails due to because some Istio+passt tests failing [1]. Turn out VMs who's virt-laucher pod have Multus network annotation in JSON form doesn't work with newer version of Istio [2]. VM with passt binding plugin produce virt-laucher pod with Multus network annotation in JSON form. Quarantine istio+passt failing tests to unblock istio upgrade and development. Tracking issue for istio upgrade [3] [1] kubevirt/kubevirtci#1331 (comment) [2] istio/istio#54820 [3] kubevirt#13832 Signed-off-by: Or Mergi <[email protected]>
CI runs very old version of Istio that does not support new k8s features and block development that utilize such features (e.g.: restart policy for init containers). The is an effort to upgrade Istio version CI use, but it fails due to because some Istio+passt tests failing [1]. Turn out VMs who's virt-laucher pod have Multus network annotation in JSON form doesn't work with newer version of Istio [2]. VM with passt binding plugin produce virt-laucher pod with Multus network annotation in JSON form. Quarantine istio+passt failing tests to unblock istio upgrade and development. Tracking issue for istio upgrade [3] [1] kubevirt/kubevirtci#1331 (comment) [2] istio/istio#54820 [3] kubevirt#13832 Signed-off-by: Or Mergi <[email protected]>
CI runs very old version of Istio that does not support new k8s features and block development that utilize such features (e.g.: restart policy for init containers). The is an effort to upgrade Istio version CI use, but it fails due to because some Istio+passt tests failing [1]. Turn out VMs who's virt-laucher pod have Multus network annotation in JSON form doesn't work with newer version of Istio [2]. VM with passt binding plugin produce virt-laucher pod with Multus network annotation in JSON form. Quarantine istio+passt failing tests to unblock istio upgrade and development. Tracking issue for istio upgrade [3] [1] kubevirt/kubevirtci#1331 (comment) [2] kubevirt#13927 [3] kubevirt#13832 Signed-off-by: Or Mergi <[email protected]>
Hi, I managed to make istio 1.24.3 work with the following config:
Missing part was setting Isito CNI pods with seLinuxOptions spc_t, following discussion at istio/istio#54815 |
@ormergi |
I prefer newer version, but if its a trouble we can start with 1.23 |
What this PR does / why we need it:
Bump Istio to the latest stable release
Which issue(s) this PR fixes (optional, in
fixes #<issue number>(, fixes #<issue_number>, ...)
format, will close the issue(s) when PR gets merged):Fixes #1324
Checklist
This checklist is not enforcing, but it's a reminder of items that could be relevant to every PR.
Approvers are expected to review this list.