Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ExternalName service doesnot generate xds correctly #50912

Open
hzxuzhonghu opened this issue May 8, 2024 · 7 comments
Open

ExternalName service doesnot generate xds correctly #50912

hzxuzhonghu opened this issue May 8, 2024 · 7 comments

Comments

@hzxuzhonghu
Copy link
Member

Following this guide https://istio.io/latest/docs/tasks/traffic-management/egress/egress-kubernetes-services/#cleanup-of-kubernetes-externalname-service

$ kubectl apply -f - <<EOF
kind: Service
apiVersion: v1
metadata:
  name: my-httpbin
spec:
  type: ExternalName
  externalName: httpbin.org
  ports:
  - name: http
    protocol: TCP
    port: 80
EOF

I cannot access my-httpbin.default.svc.cluster.local/headers expected.

After checing the xds, i cannot find the related cluster about my-httpbin

@hzxuzhonghu
Copy link
Member Author

I know #46332 is related @howardjohn is this intended to break

@howardjohn
Copy link
Member

works for me.

$  cat <<EOF | kubectl apply -f -
kind: Service
apiVersion: v1
metadata:
  name: my-httpbin
spec:
  type: ExternalName
  externalName: httpbin.org
  ports:
  - name: http
    protocol: TCP
    port: 80
EOF
service/my-httpbin created
$ qbash shell
/ $curl my-httpbin.default.svc.cluster.local/headers
{
  "headers": {
    "Accept": "*/*",
    "Host": "my-httpbin.default.svc.cluster.local",
    "User-Agent": "curl/8.5.0",
    "X-Amzn-Trace-Id": "Root=1-663b86b4-6262137f746d55f6040ad7c5",
    "X-Envoy-Attempt-Count": "1",
    "X-Envoy-Peer-Metadata": "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",
    "X-Envoy-Peer-Metadata-Id": "sidecar~10.244.0.37~shell-78486b7757-94hnr.default~default.svc.cluster.local"
  }
}
/ $

what is your setup? need more info

@hzxuzhonghu
Copy link
Member Author

Maybe i need to do that in a totally new env too. Need to investigate

@hzxuzhonghu
Copy link
Member Author

hzxuzhonghu commented May 11, 2024

@howardjohn I am using latest istio, and with ENABLE_EXTERNAL_NAME_ALIAS set true, there is no my-httpbin cluster generated. The request goes through passthrough cluster.

@howardjohn
Copy link
Member

Right, it should go through passthrough cluster unless you have SE for httpbin.org

@hzxuzhonghu
Copy link
Member Author

Then users cannot set connection pool or tls settings with DR

@howardjohn
Copy link
Member

Correct, they will need a SE for that. If they define that, the behavior will be the same as it was previously

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants