Skip to content

Add a note to Ingress Gateway docs re global default deny#2727

Open
alexh-tigera wants to merge 2 commits into
tigera:mainfrom
alexh-tigera:alexh-ci-1950-add-note-for-ingress-gateway-with-default-deny
Open

Add a note to Ingress Gateway docs re global default deny#2727
alexh-tigera wants to merge 2 commits into
tigera:mainfrom
alexh-tigera:alexh-ci-1950-add-note-for-ingress-gateway-with-default-deny

Conversation

@alexh-tigera
Copy link
Copy Markdown
Member

Ingress Gateway fails to start when a default deny rule is applied to the tigera-gateway namespace. Add a note to the ingress gateway setup docs to exclude it from the deny rules.

Product Version(s):

  • Calico 3.31
  • Calico Enterprise 3.22-2, 3.23-1
  • Calico Cloud 22-2

Issue:
https://tigera.atlassian.net/browse/EV-6476

Link to docs preview:

SME review:

  • An SME has approved this change.

DOCS review:

  • A member of the docs team has approved this change.

Additional information:

Merge checklist:

  • Deploy preview inspected wherever changes were made
  • Build completed successfully
  • Test have passed

Copilot AI review requested due to automatic review settings May 13, 2026 21:01
@alexh-tigera alexh-tigera requested a review from a team as a code owner May 13, 2026 21:01
@netlify
Copy link
Copy Markdown

netlify Bot commented May 13, 2026

Deploy Preview for calico-docs-preview-next ready!

Name Link
🔨 Latest commit 95a603e
🔍 Latest deploy log https://app.netlify.com/projects/calico-docs-preview-next/deploys/6a05ed4a85fea60008214af9
😎 Deploy Preview https://deploy-preview-2727--calico-docs-preview-next.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify project configuration.

@netlify
Copy link
Copy Markdown

netlify Bot commented May 13, 2026

Deploy Preview succeeded!

Built without sensitive environment variables

Name Link
🔨 Latest commit 95a603e
🔍 Latest deploy log https://app.netlify.com/projects/tigera/deploys/6a05ed4ad4397a0008e8308b
😎 Deploy Preview https://deploy-preview-2727--tigera.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.
Lighthouse
Lighthouse
1 paths audited
Performance: 65 (🔴 down 24 from production)
Accessibility: 98 (no change from production)
Best Practices: 92 (no change from production)
SEO: 100 (no change from production)
PWA: -
View the detailed breakdown and full score reports

To edit notification comments on pull requests, go to your Netlify project configuration.

Copy link
Copy Markdown
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Adds a warning to Ingress Gateway setup docs so users applying a global default deny policy exclude the tigera-gateway namespace.

Changes:

  • Adds the same :::note to Calico, Calico Enterprise, and Calico Cloud Ingress Gateway creation docs.
  • Links the note to the product’s global default deny policy guidance.

Reviewed changes

Copilot reviewed 3 out of 3 changed files in this pull request and generated 3 comments.

File Description
calico/networking/ingress-gateway/create-ingress-gateway.mdx Adds the default deny exclusion note for Calico OSS next docs.
calico-enterprise/networking/ingress-gateway/create-ingress-gateway.mdx Adds the default deny exclusion note for Enterprise next docs.
calico-cloud/networking/ingress-gateway/create-ingress-gateway.mdx Adds the default deny exclusion note for Cloud next docs.
Comments suppressed due to low confidence (2)

calico-enterprise/networking/ingress-gateway/create-ingress-gateway.mdx:60

  • This relative link is broken for the Enterprise docs: calico-enterprise/network-policy/get-started/kubernetes-default-deny.mdx does not exist; the default deny page in this product is under network-policy/beginners/kubernetes-default-deny.mdx. The current link will fail Docusaurus link validation and users cannot navigate to the referenced guidance.
   If you are using a [global default deny policy](../../network-policy/get-started/kubernetes-default-deny.mdx), you must add the

calico-cloud/networking/ingress-gateway/create-ingress-gateway.mdx:60

  • This relative link is broken for the Cloud docs: calico-cloud/network-policy/get-started/kubernetes-default-deny.mdx does not exist; the default deny page in this product is under network-policy/beginners/kubernetes-default-deny.mdx. The current link will fail Docusaurus link validation and users cannot navigate to the referenced guidance.
   If you are using a [global default deny policy](../../network-policy/get-started/kubernetes-default-deny.mdx), you must add the

Comment thread calico/networking/ingress-gateway/create-ingress-gateway.mdx Outdated
Comment thread calico-enterprise/networking/ingress-gateway/create-ingress-gateway.mdx Outdated
Comment on lines +59 to +62
:::note
If you are using a [global default deny policy](../../network-policy/get-started/kubernetes-default-deny.mdx), you must add the
`tigera-gateway` namespace to the list of excluded namespaces in the `namespaceSelector` field.
:::
Copy link
Copy Markdown
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Let's include this as part of the procedure.
Add your line as the final step:

  1. If you're using a global default deny policy, allow traffic through the gateway by adding the tigera-gateway namespace to the list of excluded namespaces in the namespaceSelector field.

Copy link
Copy Markdown
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ok, that makes sense. I think it should be the first step though - if you have a default deny, the envoy pods fail to deploy, and would go into a crash loop backoff until the traffic is allowed. Doing it first would allow it to start cleanly. WDYT?

@alexh-tigera alexh-tigera force-pushed the alexh-ci-1950-add-note-for-ingress-gateway-with-default-deny branch 2 times, most recently from 7efbaa9 to 4cd47dc Compare May 13, 2026 21:26
Copy link
Copy Markdown
Collaborator

@ctauchen ctauchen left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I suggest we move this to part of the procedure. We hope that nearly everyone uses a default deny, so this should be necessary for most.

Comment on lines +59 to +62
:::note
If you are using a [global default deny policy](../../network-policy/get-started/kubernetes-default-deny.mdx), you must add the
`tigera-gateway` namespace to the list of excluded namespaces in the `namespaceSelector` field.
:::
Copy link
Copy Markdown
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Let's include this as part of the procedure.
Add your line as the final step:

  1. If you're using a global default deny policy, allow traffic through the gateway by adding the tigera-gateway namespace to the list of excluded namespaces in the namespaceSelector field.

Ingress Gateway fails to start when a default deny rule is applied to
the tigera-gateway namespace. Add a note to the ingress gateway setup
docs to exclude it from the deny rules.
@alexh-tigera alexh-tigera force-pushed the alexh-ci-1950-add-note-for-ingress-gateway-with-default-deny branch from 4cd47dc to 95a603e Compare May 14, 2026 15:42
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants