The cluster was failing. Pods were stuck. Traffic stuttered. Then someone typed git reset.
Resetting a service mesh security configuration is not like rolling back a code file. In a mesh, every certificate, policy, and routing rule is tied to active workloads. Using Git to reset manifests or config maps can clear critical custom changes and instantly revert security policies to a past state. This can drop mTLS, remove authorization filters, or open unintended paths.
A Git reset in this context targets the versioned definitions that control Istio, Linkerd, Consul, or any service mesh. If your mesh configs live in Git—often under Infrastructure-as-Code with Helm, Kustomize, or plain YAML—the reset replays history at commit level. That can fix broken builds fast, but it can also remove recent patches that close CVEs or enforce zero-trust rules.
The risk is amplified in multi-cluster or multi-tenant systems. Service mesh security depends on synchronized policy enforcement across all nodes. Resetting one repo without aligning secrets, CA roots, and access control lists can fragment trust or leave systems in a partial, vulnerable state.