-
Notifications
You must be signed in to change notification settings - Fork 1.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Failed to validate networking configuration. Please ensure iptables rules are rewriting traffic as expected. #11735
Comments
It's possible that this setup doesn't leave enough time for the |
For us, I don't believe we're hitting the Talos issue described in the link. We're able to get the linkerd-network-validator to start by deleting the pod that is stuck in the crash loop. In almost all circumstances, the pod starts successfully when it's recreated. |
@wibed Please note that you posted issuer private key credentials:
These credentials could be used to forge certificates for your cluster. You should make sure to regenerate these credentials before using them in a real environment. |
i know, this is for you to avoid the necessity to google openssl commands... again. |
@jdinsel-xealth for your specific case, that's gonna get addressed with the cni-repair controller (#11699), that should be included in an edge release as soon as that merges. |
i dont think either, as i believe the cni has not correctly been dispatched on the host as assumed. kindly reopen if someone wants to take my place. |
What is the issue?
linkerd-cni combined with cilium leads the linkerd pods (destination, proxy ..) crash.
How can it be reproduced?
repro:
0. install cilium
kustomize build -o build.yaml --enable-helm --load-restrictor=LoadRestrictionsNone .
Logs, error output, etc
error:
output of
linkerd check -o short
Environment
Possible solution
No response
Additional context
No response
Would you like to work on fixing this bug?
maybe
The text was updated successfully, but these errors were encountered: