Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Check security identity as part of connectivity test #1100

Open
sayboras opened this issue Sep 21, 2022 · 1 comment
Open

Check security identity as part of connectivity test #1100

sayboras opened this issue Sep 21, 2022 · 1 comment
Labels
kind/enhancement This would improve or streamline existing functionality.

Comments

@sayboras
Copy link
Member

Apart from checking the drop reason and direction, it could be good to check the remote security identity. For that last one, it's probably enough to check that it is neither unknown nor a reserved identity unless expected. Checking the exact pod identity is probably overengineering/overtesting.

Checking the identity may help us catch cases where we dropped the packets because the identity resolution failed and it should have succeeded but failed to find a corresponding policy rule afterward. Definitely less important than checking the drop reason and direction.

Originally posted by @pchaigno in #1046 (comment)

@sayboras sayboras changed the title Check security identity as part connectivity test Check security identity as part of connectivity test Sep 21, 2022
@pchaigno pchaigno added the kind/enhancement This would improve or streamline existing functionality. label Sep 21, 2022
Copy link

This issue has been automatically marked as stale because it has not
had recent activity. It will be closed if no further activity occurs.

@github-actions github-actions bot added the stale label Sep 28, 2024
@sayboras sayboras removed the stale label Sep 28, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/enhancement This would improve or streamline existing functionality.
Projects
None yet
Development

No branches or pull requests

2 participants