-
Notifications
You must be signed in to change notification settings - Fork 3.7k
L7 policy for HTTP breaks IPv6 connectivity to world #37932
Copy link
Copy link
Closed
Labels
area/datapathImpacts bpf/ or low-level forwarding details, including map management and monitor messages.Impacts bpf/ or low-level forwarding details, including map management and monitor messages.area/kernelRequires upstream work in the Linux kernel.Requires upstream work in the Linux kernel.area/proxyImpacts proxy components, including DNS, Kafka, Envoy and/or XDS servers.Impacts proxy components, including DNS, Kafka, Envoy and/or XDS servers.feature/ipv6Relates to IPv6 protocol supportRelates to IPv6 protocol supportkind/bugThis is a bug in the Cilium logic.This is a bug in the Cilium logic.kind/community-reportThis was reported by a user in the Cilium community, eg via Slack.This was reported by a user in the Cilium community, eg via Slack.sig/policyImpacts whether traffic is allowed or denied based on user-defined policies.Impacts whether traffic is allowed or denied based on user-defined policies.
Metadata
Metadata
Assignees
Labels
area/datapathImpacts bpf/ or low-level forwarding details, including map management and monitor messages.Impacts bpf/ or low-level forwarding details, including map management and monitor messages.area/kernelRequires upstream work in the Linux kernel.Requires upstream work in the Linux kernel.area/proxyImpacts proxy components, including DNS, Kafka, Envoy and/or XDS servers.Impacts proxy components, including DNS, Kafka, Envoy and/or XDS servers.feature/ipv6Relates to IPv6 protocol supportRelates to IPv6 protocol supportkind/bugThis is a bug in the Cilium logic.This is a bug in the Cilium logic.kind/community-reportThis was reported by a user in the Cilium community, eg via Slack.This was reported by a user in the Cilium community, eg via Slack.sig/policyImpacts whether traffic is allowed or denied based on user-defined policies.Impacts whether traffic is allowed or denied based on user-defined policies.
Is there an existing issue for this?
Version
equal or higher than v1.17.1 and lower than v1.18.0
What happened?
HTTP L7 policy breaks IPv6 connectivity to a server outside the cluster.
How can we reproduce the issue?
Run
cilium-cli/cilium connectivity test -v --test 'to-fqdns/pod-to-world$'on this commit (that enables IPv6 PodToWorld tests) on a dual-stack cluster.Cilium Version
1b28ec1
Kernel Version
6.8.0-54-generic #56-Ubuntu SMP PREEMPT_DYNAMIC Sat Feb 8 00:37:57 UTC 2025 x86_64 x86_64 x86_64 GNU/Linux
Kubernetes Version
Client Version: v1.32.2
Kustomize Version: v5.5.0
The connection to the server localhost:8080 was refused - did you specify the right host or port?
Regression
No response
Sysdump
cilium-sysdump-20250227-185144.zip
cilium-sysdump-20250227-185339.zip
Relevant log output
Anything else?
As pointed out by @jrajahalme, Envoy is getting a connection timeout, that's why it returns 503.
As also pointed out by @jrajahalme, the second CT entry shouldn't be there:
With IPv4, we only have the 1st and 3rd.
Cilium Users Document
Code of Conduct