Cilium connectivity test appear to fail #1841
-
Environment
Issue Summary
Configurations Tested (each time on a fresh cluster)1. Native mode with
|
Beta Was this translation helpful? Give feedback.
Replies: 1 comment
-
Hi @Lur1an, This is not a bug but a configuration issue. By default, our module sets SolutionYou have two options: Option 1: Disable outbound traffic restrictions (easier)Add this to your configuration: restrict_outbound_traffic = false Option 2: Keep restrictions but add specific rulesIf you want to keep the security restrictions but allow specific tests, you can add custom firewall rules: extra_firewall_rules = [
{
description = "Allow all outbound traffic for testing"
direction = "out"
protocol = "tcp"
port = "" # Empty means all ports
destination_ips = ["0.0.0.0/0", "::/0"]
},
{
description = "Allow all outbound UDP traffic for testing"
direction = "out"
protocol = "udp"
port = "" # Empty means all ports
destination_ips = ["0.0.0.0/0", "::/0"]
}
] Additional NotesYour Cilium configuration looks correct. The issue is purely related to the firewall restrictions. Once you apply either solution above and redeploy, the connectivity tests should pass. Is it acceptable to run with failing connectivity tests?While the cluster will function for most workloads even with these test failures, it's better to have them pass. The tests validate that pods can reach external services, which is important for:
If your workloads don't need external connectivity, you can ignore the test failures, but most real-world applications do need to reach external services. |
Beta Was this translation helpful? Give feedback.
Hi @Lur1an,
This is not a bug but a configuration issue. By default, our module sets
restrict_outbound_traffic = true
which restricts outbound traffic to only essential ports (DNS, HTTP, HTTPS, and ICMP). This security-first approach can interfere with Cilium connectivity tests that need to reach external endpoints.Solution
You have two options:
Option 1: Disable outbound traffic restrictions (easier)
Add this to your configuration:
Option 2: Keep restrictions but add specific rules
If you want to keep the security restrictions but allow specific tests, you can add custom firewall rules: