-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Feature Request] Add Support for k8s gateway APIs (formerly Service APIs) #1338
Comments
/kind feature-request
|
@M00nF1sh: The label(s) In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-contributor-experience at kubernetes/community. |
Rotten issues close after 30d of inactivity. Send feedback to sig-contributor-experience at kubernetes/community. |
@fejta-bot: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/reopen |
@kishorj: Reopened this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-contributor-experience at kubernetes/community. |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
this is available here https://github.com/aws/aws-application-networking-k8s |
@bryantbiggs |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
Keep |
/remove-lifecycle stale |
Some comments on requirements, from looking over #3146: The Gateway code shouldn't support annotations for things that can be expressed in We will probably need to implement two GatewayController values, one supporting TCPRoute, TLSRoute, and UDPRoute backed by NLB and another supporting HTTPRoute and GRPCRoute backed by ALB. |
Is PR #3146 still being actively developed? Any updates are appreciated! Support for controlling ALBs via Gateway API and HTTPRoute, rather than just via Ingress, would be really beneficial to our apps. In our Kubernetes clusters on other providers, we are adopting Gateway API for specifying ingress into the cluster, based on its improved persona-based model and its promotion by the Kubernetes community as a successor to Ingress resources. It would be good to have a uniform approach where apps can rely on Gateway API in both EKS and other K8s providers, rather than asking developers to use Gateway in one place and Ingress in another. |
+1 As per kubernetes documentation, Ingress is frozen and new features are being added to the Gateway API. |
+1 I'm excited about the potential of Kubernetes Gateway API, it's such a powerful tool for managing ingress traffic. ALB is a widely used AWS service, and without support for this, many users might hesitate to adopt Gateway API, which would be a shame considering its potential. Adding support for ALB would greatly enhance the usability and adoption of Gateway API, opening it up to a broader audience of Kubernetes users who rely on AWS infrastructure. |
If AWS's advice is to use Gateway Controller (https://www.gateway-api-controller.eks.aws.dev/) could you please share with us some best practices or guidelines on how to migrate to that with the least disruption and requirements like Load balancing, security, SSL ? |
@geowalrus4gh - I'm not sure I understand it right, and it would be great to get feedback from someone affiliated with AWS, but I think that "AWS Gateway API Controller" serves a different purpose. I don't think it manages AWS Load Balancers for you, because its docs only reference creating AWS VPC Lattice objects. I guess your application could create different Gateway objects and have them observed by different controllers - the "AWS Load Balancer Controller" would create/update a Load Balancer for your K8s Gateway while the "AWS Gateway API Controller" would create/update VPC Lattice for your K8s Gateway. I'm not very familiar with VPC Lattice, but I think Load Balancer is more for external users accessing your service while VPC Lattice is more for service-to-service traffic. |
@jdoylei Your points are valid. "AWS Gateway API Controller" creates and manages only AWS VPC services. "AWS Load Balancer Controller" would only create/update a Load Balancer. I was referring to the comment from @bryantbiggs. Missed out on to comment as a reply.
I also agree with your comment
K8s Gateway API is designed to support both North-South and East-West Traffic. So naturally, we would expect that one single controller supports both. Now I can see the same question is asked in the other gateway controller github. |
I would like to Gateway API implementation on my choice to support AWS ALB, for example Cilium Gateway API, and AWS Load Balancer controller only can help with this |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/remove-lifecycle stale |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
Keep |
/remove-lifestyle stale
…On Sat, Dec 14, 2024, 3:51 PM kahirokunn ***@***.***> wrote:
Keep
—
Reply to this email directly, view it on GitHub
<#1338 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAFF3AIKQZYTSLITEAWRHZT2FSK3PAVCNFSM4PTQV6Z2U5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TENJUGMZTIMJSGIYA>
.
You are receiving this because you are subscribed to this thread.Message
ID: <kubernetes-sigs/aws-load-balancer-controller/issues/1338/2543341220@
github.com>
|
/remove-lifecycle stale |
SIG-NETWORK created the Service APIs project to evolve service-related APIs for Kubernetes. This issue is a request for aws-alb-ingress-controller to add support for Service APIs.
The text was updated successfully, but these errors were encountered: