Added Exclusion for istioGateway to Gatekeeper Umbrella Chart
General MR
Summary
Gatekeeper is blocking deployment of gateway helm charts due to the use of the net.ipv4.ip_unprivileged_port_start
sysctl. An exclusion was added for the entire istio-gateway
namespace to ensure default gateways work and any custom gateways added by users will also work.
Justification for Exclusion:
As mentioned here Istio applies only the minimum permissions required to allow binding to ports 80 and 443. Additionally, Kubernetes documentation here lists the specific sysctl in use as safe as of Kubernetes version 1.22 and above.
Relevant logs/screenshots
Output of kubectl get K8sPSPForbiddenSysctls -o yaml | grep excludedResources -A 5
with istioGateway disabled:
excludedResources:
- default/restrict-sysctls-.?
forbiddenSysctls:
- '*'
status:
auditTimestamp: "2025-05-14T11:08:27Z"
Output of kubectl get K8sPSPForbiddenSysctls -o yaml | grep excludedResources -A 5
with istioGateway enabled:
excludedResources:
- istio-gateway/*.*
- default/restrict-sysctls-.?
forbiddenSysctls:
- '*'
status:
Output of flux get hr -A
showing successful helm deployment without custom exception in test-values.yaml file:
Linked Issue
Upgrade Notices
N/A