Known Limitations
The known limitations in this release are:
Kube-proxy mode set to IPVS is currently not supported.
If a C-VEN on a server hosting containers is paired directly into the Enforced policy state, other nodes may lose connectivity with the master node until policy is synchronized across all the nodes.
Pods which run on the host network stack (inherit the host IP address) are not reported to the PCE. Any rules written for the host will also be inherited by any hostNetworked Pods on the host.
If you are using an external load balancer, the policy configuration will be dependent on the type of the load balancer used.
Kubernetes uses NAT tables, which depend on traffic being tracked and stateful. Therefore, it is not recommended to use stateless rules.
If a Kubernetes service has both port 1234/TCP and port 2345/UDP configured, a rule configured with the Pod as source and the virtual service as Provider will open up both ports 1234/TCP and 2345/TCP, and 1234/UDP and 2345/UDP on the Pod's firewall (outbound rule).
In case of a Kubernetes service configured with a
port
andtargetPort
statement in the manifest file as shown in the example below:apiVersion: v1 kind: Service metadata: name: web-frontend-svc namespace: app1 labels: app: app1 tier: web-frontend annotations: com.illumio.role: Web spec: type: ClusterIP ports: - port: 8080 targetPort: 80 protocol: TCP - port: 8081 targetPort: 81 protocol: UDP selector: app: app1 tier: web-frontend
This configuration is supported with Illumio Core. In this case, only the port number associated to the
port
statement will show this issue, the port number associated to thetargetPort
statement will not show this issue and will use theprotocol
specified in the Service yaml file.