โ Inter-service Call Fails After ZTA Activation (RBAC: access denied)¶
๐งญ Context¶
This issue occurs during testing of Zero Trust Architecture enforcement in a local Kubernetes cluster using a Kind-based environment.
- Tool used:
curl
inside a pod (manual test) - Command run:
Kind
cluster bootstrapped via task dev
, ZTA activated with task activate-zta
* Precondition: Helm values toggled to enable authn
, authz
, gateway
, etc. ๐งจ Symptoms¶
- Curl request from one pod to another fails with:
-
No service response, Istio blocks traffic based on authorization policies
-
No issues observed before enabling ZTA
๐ Possible Causes¶
- Istio
AuthorizationPolicy
now enforces strict service identity checks - No valid JWT token or SPIFFE identity presented in service call
- Sidecar injection is active, but traffic lacks credentials to satisfy ZTA rules
โ Resolution (If Available)¶
โ Fetch a valid token using:
Then retry the request inside the pod with:
This restores access by satisfying the authentication and authorization layers.
๐งช Workarounds (Optional)¶
- Temporarily disable ZTA by running:
Not recommended in production but useful for debugging.
๐ External References¶
๐ง Notes¶
- This issue is expected once ZTA is active
- A helpful follow-up task could pre-check token presence or inject it automatically into test pods
- Should be documented clearly in the developer onboarding section