You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Cloudflare Tunnel appears to work without establishing a connection to the required ports (443 or 7844). Even these ports are not allowed through Kubernetes network policies, the tunnel still seems operational, which is unexpected.
Steps to Reproduce
Deploy Cloudflared Pod in Kubernetes:
Deploy a cloudflared pod in a Kubernetes cluster configured to use Cloudflare Tunnel.
Configure Egress Network Policy:
Create a NetworkPolicy that allow outbound traffic only for specific ports such as 53 (DNS) or 3306 (MySQL).
Attempt to route traffic through the Cloudflare Tunnel and observe if it still works despite the connection errors.
Expected Behavior
The Cloudflare Tunnel should fail to establish a connection and stop working when outbound traffic to the required ports (443 or 7844) is blocked.
Actual Behavior
The Cloudflare Tunnel appears to remain functional even when outbound traffic to the required ports is blocked, leading to unexpected behavior.
Environment
Kubernetes Cluster
Cloudflared Pod
Egress rules managed through Kubernetes Network Policies
Additional Notes
This issue raises concerns about whether the tunnel is falling back to alternative mechanisms or routes that bypass the explicitly blocked ports. Any insights or clarifications regarding this behavior would be appreciated.
The text was updated successfully, but these errors were encountered:
This doesn't seem to be a cloudflared issue, but rather a configuration problem with your Kubernetes setup. Cloudflared establishes connections to our network on a specific IP range and ports. After establishing these connections, it will use them to proxy traffic to your origins.
To troubleshoot this issue, I recommend that you investigate your Kubernetes setup further. For example:
Create a test pod with netcat installed and attempt to establish connections to servers outside the cluster on specific ports. This will help confirm whether the issue lies with the cluster's ability to block outgoing connections.
Review all network policies within the cluster to determine if any rules are allowing traffic. Specifically, check if there are any policies that allow traffic to flow to the internet or if the default behavior of the cluster is not to block outbound connections.
Description
Cloudflare Tunnel appears to work without establishing a connection to the required ports (
443
or7844
). Even these ports are not allowed through Kubernetes network policies, the tunnel still seems operational, which is unexpected.Steps to Reproduce
Deploy Cloudflared Pod in Kubernetes:
cloudflared
pod in a Kubernetes cluster configured to use Cloudflare Tunnel.Configure Egress Network Policy:
NetworkPolicy
that allow outbound traffic only for specific ports such as53
(DNS) or3306
(MySQL).Expected Behavior
The Cloudflare Tunnel should fail to establish a connection and stop working when outbound traffic to the required ports (
443
or7844
) is blocked.Actual Behavior
The Cloudflare Tunnel appears to remain functional even when outbound traffic to the required ports is blocked, leading to unexpected behavior.
Environment
Additional Notes
This issue raises concerns about whether the tunnel is falling back to alternative mechanisms or routes that bypass the explicitly blocked ports. Any insights or clarifications regarding this behavior would be appreciated.
The text was updated successfully, but these errors were encountered: