Skip to content

v1.19 Backports 2026-03-09#44699

Merged
tommyp1ckles merged 11 commits intov1.19from
pr/v1.19-backport-2026-03-09-10-37
Mar 12, 2026
Merged

v1.19 Backports 2026-03-09#44699
tommyp1ckles merged 11 commits intov1.19from
pr/v1.19-backport-2026-03-09-10-37

Conversation

liyihuang and others added 11 commits March 9, 2026 10:37
[ upstream commit 6c96257 ]

Add circuit breaker configuration to both the egress and ingress Envoy clusters to limit retry attempts.

Signed-off-by: Liyi Huang <liyi.huang@isovalent.com>
Signed-off-by: Tom Hadlaw <tom.hadlaw@isovalent.com>
[ upstream commit 3efb667 ]

While we have #43049 to cover
embedded case. This PR is to cover the external envoy use case to use
clusterMaxRequests and clusterMaxConnections

Signed-off-by: Liyi Huang <liyi.huang@isovalent.com>
Signed-off-by: Tom Hadlaw <tom.hadlaw@isovalent.com>
[ upstream commit c3f731d ]

Signed-off-by: Antony Reynaud <antony.reynaud@isovalent.com>
Signed-off-by: Tom Hadlaw <tom.hadlaw@isovalent.com>
[ upstream commit e2728a8 ]

Available in preview since Feb 2026

Signed-off-by: Antony Reynaud <antony.reynaud@isovalent.com>
Signed-off-by: Tom Hadlaw <tom.hadlaw@isovalent.com>
[ upstream commit 61e04f7 ]

The InterfaceMAC field is not filled from the tunnel dev's MAC address.
Because of this the BPF program for the overlay resolves to
00:00:00:00:00:00, sending this broken response to the VTEP ARP lookup
request.

Fixes: #44453

Signed-off-by: akos011221 <orbanakos2001@gmail.com>
Signed-off-by: Tom Hadlaw <tom.hadlaw@isovalent.com>
[ upstream commit 2f29851 ]

The 'loadBalancer' option conditional in the Helm template was missing its closing statement, creating a potential issue where omitting this configuration section could prevent half of the available option configurations from being applied to Cilium.

While this issue was not encountered in practice due to default values always being present for loadBalancer configuration, it represents a logical error in the template structure that should be corrected to ensure a valid and robust Helm chart.

Signed-off-by: Matej Líner <matej.liner@lablabs.io>
Signed-off-by: Tom Hadlaw <tom.hadlaw@isovalent.com>
[ upstream commit 3ee4e0f ]

This option was previously hidden from user documentation due to being commented out in the Helm template. The default Helm value aligns with the default value in the Cilium binary, ensuring no functional changes when enabled. Exposing this configuration improves discoverability for users who need to modify this setting.

Signed-off-by: Matej Líner <matej.liner@lablabs.io>
Signed-off-by: Tom Hadlaw <tom.hadlaw@isovalent.com>
[ upstream commit 4fae8ec ]

Added Labyrinth Labs to USERS.md

Signed-off-by: Matej Líner <matej.liner@lablabs.io>
Signed-off-by: Tom Hadlaw <tom.hadlaw@isovalent.com>
[ upstream commit f38aa1b ]

During investigation of a memory leak in v1.18, one of the pprof
profiles showed a high amount of memory usage in
`netlink/nl.(*NetlinkSocket).Receive`.

#41623 (comment)

This is most likely due to a lack of rate limiting in the desired
neighbor calculation which does a lot of netlink requests to get next hops.

So this commit limits desired neighbor calculation to once every 15
seconds. In the worst case scenario where the default gateway changes,
XDP might not be able to forward traffic for up to 15 seconds. Such
a scenario should only happen when configuration changes are made or
when the network topology changes, and thus this seems an acceptable
tradeoff.

Signed-off-by: Dylan Reimerink <dylan.reimerink@isovalent.com>
Signed-off-by: Tom Hadlaw <tom.hadlaw@isovalent.com>
[ upstream commit 055bef2 ]

Set up XFRM states before updating LocalNode.EncryptionKey to ensure
ingress is ready before peers learn about the new key via CiliumNode CRD.

Fixes packet drops during rotation under CPU contention where
AllNodeValidateImplementation() takes longer than CRD propagation.

Signed-off-by: Daan Vinken <daanvinken@tythus.com>
Signed-off-by: Tom Hadlaw <tom.hadlaw@isovalent.com>
[ upstream commit 4b1f0b2 ]

Add Info log when keyfile is loaded, Info logs for XFRM state
conflict resolution in xfrmStateReplace, and a Debug log when
the BPF encrypt map is updated.

Signed-off-by: Daan Vinken <daanvinken@tythus.com>
Signed-off-by: Tom Hadlaw <tom.hadlaw@isovalent.com>
@tommyp1ckles tommyp1ckles added kind/backports This PR provides functionality previously merged into master. backport/1.19 This PR represents a backport for Cilium 1.19.x of a PR that was merged to main. labels Mar 9, 2026
@tommyp1ckles
Copy link
Copy Markdown
Contributor Author

/test

@tommyp1ckles tommyp1ckles marked this pull request as ready for review March 9, 2026 22:25
@tommyp1ckles tommyp1ckles requested review from a team as code owners March 9, 2026 22:25
@Artyop
Copy link
Copy Markdown
Contributor

Artyop commented Mar 10, 2026

/ci-gke

@Artyop
Copy link
Copy Markdown
Contributor

Artyop commented Mar 10, 2026

/ci-aks

Copy link
Copy Markdown
Contributor

@Artyop Artyop left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm

@maintainer-s-little-helper maintainer-s-little-helper bot added the ready-to-merge This PR has passed all tests and received consensus from code owners to merge. label Mar 12, 2026
@tommyp1ckles tommyp1ckles added this pull request to the merge queue Mar 12, 2026
Merged via the queue into v1.19 with commit 6951c90 Mar 12, 2026
494 of 500 checks passed
@tommyp1ckles tommyp1ckles deleted the pr/v1.19-backport-2026-03-09-10-37 branch March 12, 2026 17:07
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

backport/1.19 This PR represents a backport for Cilium 1.19.x of a PR that was merged to main. kind/backports This PR provides functionality previously merged into master. ready-to-merge This PR has passed all tests and received consensus from code owners to merge.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

8 participants