Skip to content

Conversation

aauren
Copy link
Collaborator

@aauren aauren commented Sep 27, 2025

Attempt to filter out sets that we are not authoritative for to avoid race conditions with other operators (like Istio) that might be attempting to modify ipsets at the same time.

This still needs some refinement and probably a refactor or two, but wanted to get it out early so that you could test it and see if it actually resolves what you were seeing in #1918. I tried it in my cluster, and after proving that I could see kube-router modifying other ipsets, then applied this change, and saw that it no longer contained references in its output.

FYI @mjnagel @ilrudie

Attempts to fix #1918

Attempt to filter out sets that we are not authoritative for to avoid
race conditions with other operators (like Istio) that might be
attempting to modify ipsets at the same time.
@mjnagel
Copy link

mjnagel commented Sep 29, 2025

This seems to behave as expected, not modifying Istio ipsets in testing. I went through testing with the steps in this gist. When using the latest image it failed due to the linked issue, but with an image built from this branch everything worked.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Race condition resulting in other ipsets being modified
2 participants