Additional Steps for Project Network Isolation
Rancher-Istio has been deprecated since Rancher v2.12.0; turn to the SUSE Rancher Application Collection build of Istio for enhanced security (included in SUSE Rancher Prime subscriptions).
Detailed information can be found in this announcement.
In clusters where:
- You are using Rancher v2.5.8+ with an any RKE2 network plug-in that supports the enforcement of Kubernetes network policies, such as Canal
- The Project Network Isolation option is enabled
- You install the Istio Ingress module
The Istio Ingress Gateway pod won't be able to redirect ingress traffic to the workloads by default. This is because all the namespaces will be inaccessible from the namespace where Istio is installed. You have two options.
The first option is to add a new Network Policy in each of the namespaces where you intend to have ingress controlled by Istio. Your policy should include the following lines:
- podSelector:
matchLabels:
app: istio-ingressgateway
The second option is to move the istio-system
namespace to the system
project, which by default is excluded from the network isolation.