Skip to content

Commit b820198

Browse files
authored
Add limitations for having OIDC and Istio enabled (#5940)
* Add limitations for having OIDC and Istio enabled * Fix list
1 parent 6dfdbfb commit b820198

File tree

1 file changed

+26
-0
lines changed

1 file changed

+26
-0
lines changed

docs/eventing/experimental-features/sender-identity.md

Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -234,3 +234,29 @@ Send events to the Broker using OIDC authentication:
234234
"name": "authenticated"
235235
}
236236
```
237+
238+
## Limitations with Istio
239+
240+
You might experience issues with the [eventing integration with Istio](https://github.com/knative-extensions/eventing-istio) and having the `authentication-oidc` feature flag enabeled, when the JWKS URI is represented via an IP. E.g. like in the following case:
241+
242+
```
243+
$ kubectl get --raw /.well-known/openid-configuration | jq
244+
{
245+
"issuer": "https://kubernetes.default.svc",
246+
"jwks_uri": "https://172.18.0.3:6443/openid/v1/jwks",
247+
...
248+
}
249+
```
250+
251+
In this case you need to add the [`traffic.sidecar.istio.io/excludeOutboundIPRanges: <JWKS IP>/32`](https://istio.io/latest/docs/reference/config/annotations/#SidecarTrafficExcludeOutboundIPRanges) annotation to the pod templates of the following deployments:
252+
253+
- `imc-dispatcher`
254+
- `mt-broker-ingress`
255+
- `mt-broker-filter`
256+
257+
For example:
258+
259+
```
260+
$ kubectl -n knative-eventing patch deploy imc-dispatcher --patch '{"spec":{"template":{"metadata":{"annotations":{"traffic.sidecar.istio.io/excludeOutboundIPRanges":"172.18.0.3/32"}}}}}'
261+
deployment.apps/imc-dispatcher patched
262+
```

0 commit comments

Comments
 (0)