-
Notifications
You must be signed in to change notification settings - Fork 253
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Hubble loses the FQDN reference after a few moments after it is resolved #1438
Comments
Hi, I spent some time with some of the cilium maintainers to understand this issue better. Here's what has been found so far. The In your Below is a quick capture from my lap showing the k exec -n kube-system cilium-7hdqd -it -- cilium-dbg fqdn cache list
Defaulted container "cilium-agent" out of: cilium-agent, config (init), mount-bpf-fs (init), clean-cilium-state (init), install-cni-binaries (init)
Endpoint Source FQDN TTL ExpirationTime IPs
746 connection jobs-app-kafka-brokers.tenant-jobs.svc.cluster.local. 0 0001-01-01T00:00:00.000Z 10.244.2.48
1279 lookup api.github.com. 2 2024-04-04T15:48:23.486Z 140.82.121.5
1279 connection loader.tenant-jobs.svc.cluster.local. 0 0001-01-01T00:00:00.000Z 10.109.69.105
1279 connection api.github.com. 0 0001-01-01T00:00:00.000Z 140.82.121.6
602 connection elasticsearch-master.tenant-jobs.svc.cluster.local. 0 0001-01-01T00:00:00.000Z 10.102.40.97
350 connection jobs-app-zookeeper-client.tenant-jobs.svc.cluster.local. 0 0001-01-01T00:00:00.000Z 10.104.222.238
350 connection jobs-app-kafka-0.jobs-app-kafka-brokers.tenant-jobs.svc.cluster.local. 0 0001-01-01T00:00:00.000Z 10.244.2.48 We looked into the following hubble code which pulls the IP/FQDN from the cache. At the moment it seems like the behaviour is working as expected, or rather coded. However, we think there is an opportunity to improve this behaviour. Using the However, because of that, we find the situation you have logged arises. We could fall back to using the That would look something like this (example with an *): Apr 2 15:56:45.180: services/poc-bff-66f46654c-7565m:45148 (ID:103419) -> redis.sandbox.whitelabel.com.br*:6379 (ID:16777220) to-stack FORWARDED (TCP Flags: ACK) In this scenario where the TTL has expired for the |
Hello @saintdle ! What I expect is to see those FQDNs in hubble and not "world", even for long lived connections. If the lookup is expired but there still a connection, it should show the FQDN and not "world". That's make sense? ps. sorry for the delay. |
Yes sure, so in that case, when the FQDN is shown but it's from a connection, as the TTL has expired, then it would be best to mark it as such. |
Hey @rooque just wondering if you have any issues with egress |
@rooque I stumbled on this in the docs, maybe it's useful for this use case currently |
I'm having some strange behavior with FQDN destination in Hubble. I have 2 FQDNs, that 2 pods connects :
At first, the FQDN appears both in the service map and in the list correctly. After a few moments, it starts treating the FQDNs' IPs as "world". (see images)
Images
The problem is not just in the UI, in the CLI is the same
NetworkPolicy
The FQDNs shows in this lists, always even after it starting showing as WORLD
Also: Every time I restart the pods, I shows the FQDNs for a very short time... Then it start showing as World again.
Cilium Config
Client: 1.15.2 7cf57829 2024-03-13T15:34:43+02:00 go version go1.21.8 linux/amd64
Daemon: 1.15.2 7cf57829 2024-03-13T15:34:43+02:00 go version go1.21.8 linux/amd64
SysDump
cilium-sysdump-20240403-174046.zip
The text was updated successfully, but these errors were encountered: