-
Notifications
You must be signed in to change notification settings - Fork 12
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Test internet connectivity of the machines #159
Conversation
robertvolkmann
commented
Apr 19, 2024
•
edited
Loading
edited
- Added targets to ssh into the firewall and machine in both flavors
- Added target to curl against cloudflare
- Use frr container for internet vrf also for cumulus
@Gerrit91 do we still need these lines in the integration test script?
|
ssh login over link-local addresses is prohibited because these are not part of hosts.allowed anymore. @majst01 Any reason not to include link-local addresses? |
This was part of the requirements from the CIS benchmark. I think we can allow ssh access from localhost. |
Do we need the SSH access only for the integration tests? |
It is actually in the hosts.allow:
Is the ipv6 link local missing ? |
Yes, the LLA range |
But this is not intended for production, can we modify this only in the integration tests in mini-lab ? |
Can I change |
Userdata should be the simplest way as long as you only test the metal-only use case. With gardener the userdata is generated by os-metal-extension |
The firewall has access to the internet, but the machine does not. Packets arrive at the firewall but do not enter the vrf104009.
But the route leaking looks good.
|
Firewall images not containing the PR metal-stack/metal-images#214 work on my machine. But outgoing access still doesn't work on our CI system. @majst01 Any workaround for the PR? |
The firewall creation in the mini-lab must contain a initial ruleset to allow traffic, see
|
|
|
The test tries to connect with port 80 which is not in the allowed rule set. |
BTW: Ping, e.g. ICMP is actually not supported with the firewall-rules set during boot :-) You should check if you can curl https://1.1.1.1 |
I already switched to https://1.1.1.1 but it still doesn't work on the GitHub runners. |
Accessing the internet from the machine works on the GitHub runner as well, but SSH login to the firewall still does not work. |
This might be because there need to be a input rule added which allows ssh access |
The firewalls have an input chain allowing SSH access:
instead of the input chain that is present in production:
It works locally without any issue but not on the GitHub runner. |
@majst01 Thanks for remaining on: It’s always MTU, unless it’s DNS. |
LGTM |