Replies: 4 comments 5 replies
-
Based on the documentation you should use |
Beta Was this translation helpful? Give feedback.
-
What you see it is just a warning and not an actual problem: apiVersion: security.istio.io/v1beta1
kind: PeerAuthentication
metadata:
name: default
spec:
mtls:
mode: STRICT The Pods are in mTLS, you can test it with
you can easily test what happens if you disable the mTLS :
As you can see, the pod is not in TLS anymore. Same for the Management UI:
|
Beta Was this translation helpful? Give feedback.
-
@lordigon Did you ever manage to solve this? |
Beta Was this translation helpful? Give feedback.
-
Is this a cluster-operator bug that you have to override the appProtocol or
is it something specific to Istio?
If it is a bug, overriding it is a good workaround, but it should be fixed
in the cluster operator.
…On Fri, Nov 10, 2023 at 9:05 AM K Xiong ***@***.***> wrote:
In case anyone is still looking, you can overwrite the appPortocols
similar to how the additional ports example
<https://github.com/rabbitmq/cluster-operator/blob/main/docs/examples/additionalPorts/rabbitmq.yaml>
creates new ports.
Something like this worked for me:
spec:
replicas: 3
override:
service:
spec:
ports:
- name: prometheus
protocol: TCP
port: 15692
targetPort: 15692
appProtocol: tcp
—
Reply to this email directly, view it on GitHub
<#5226 (reply in thread)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/ACI7PIWYFAALBE5NAMKHIWLYDXN5PAVCNFSM53RPUVUKU5DIOJSWCZC7NNSXTOKENFZWG5LTONUW63SDN5WW2ZLOOQ5TONJTGA4DCMA>
.
You are receiving this because you are subscribed to this thread.Message
ID: <rabbitmq/rabbitmq-server/repo-discussions/5226/comments/7530810@
github.com>
--
Michał
RabbitMQ team
|
Beta Was this translation helpful? Give feedback.
-
Hi everyone,
I created a RabbitMQ cluster using RabbitMQ Operator with this yaml file
I tried to add Istio and configure it but looking at the result via Kiali console some protocol seems not supported automatically.
I'm not an istio expert but reading its documentation Istio automatically manage TCP port using appProtocol property
This is the list of TCP ports used by the RabbitMQ Cluster with appProtocol values
so amqp within appProtocol filed is not recognised as valid Istio supported protocol.
Looking at Istio documentation supported protocol values inside appProtocol field are:
http, http2, https, tcp, pls, grpc, grpc-web, mongo, mysql, redis.
Is that a bug or something is missing me?
Best regards,
Flavio
Beta Was this translation helpful? Give feedback.
All reactions