Open Service Mesh (OSM) is a lightweight, extensible, cloud native service mesh that allows users to uniformly manage, secure, and get out-of-the-box observability features for highly dynamic microservice environments.
Bug description:
We've a setup very similar to https://release-v1-2.docs.openservicemesh.io/docs/demos/ingress_k8s_nginx/.
It works fine, except that when the ingress-nginx pods change (rollout restart on the Deployment for instance), it seems OSM doesn't notice it (logs are silent) and envoy is not updated, which means all ingress traffic from the new ingress-nginx Pods is then blocked.
Affected area (please mark with X where applicable):
Install [ ]
SMI Traffic Access Policy [ ]
SMI Traffic Specs Policy [ ]
SMI Traffic Split Policy [ ]
Permissive Traffic Policy [ ]
Ingress [X]
Egress [ ]
Envoy Control Plane [ ]
CLI Tool [ ]
Metrics [ ]
Certificate Management [ ]
Sidecar Injection [ ]
Logging [ ]
Debugging [ ]
Tests [ ]
Demo [ ]
CI System [ ]
Expected behavior:
OSM should watch the IngressBackend's Source Pods and update the allowed Ingress automatically.
Steps to reproduce the bug (as precisely as possible):
Bug description: We've a setup very similar to https://release-v1-2.docs.openservicemesh.io/docs/demos/ingress_k8s_nginx/. It works fine, except that when the ingress-nginx pods change (rollout restart on the Deployment for instance), it seems OSM doesn't notice it (logs are silent) and envoy is not updated, which means all ingress traffic from the new ingress-nginx Pods is then blocked.
Affected area (please mark with X where applicable):
Expected behavior: OSM should watch the IngressBackend's Source Pods and update the allowed Ingress automatically.
Steps to reproduce the bug (as precisely as possible):
How was OSM installed?: AKS built-in addon
Environment:
osm version
): 1.2.3kubectl version
): 1.25.6