-
Notifications
You must be signed in to change notification settings - Fork 323
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
sync-catalog: Support ClusterIP
endpoints
#4
Comments
This would be great to have. In a setup where the HAProxy farm runs itself on pods and can reach any endpoint ClusterIP would be ideal to expose services. Kudos for the work done so far, very useful! |
Just curious why you assume the pods are routable? Typically pods are only routable when using a cloud providers CNI plugins. Almost anything on-prem, most commonly Flannel, will have non-routable pod IPs. I'm assuming this is why when I try to deploy the client only, the pod goes into CLBO with the log message |
There are two reasons! First, with any new release ("0.1"-type software), we focus on getting started experience as a primary use case. Most getting started experiences with K8S are either minikube or a hosted solution. All hosted solutions have easily routable pod IPs as you stated. Second, we also of course survey our customers (which are generally enterprises, global 2000 size) and get their use case so that we're designing with that in mind even if we don't solve their problem day 1. A surprisingly large number have routable pod IPs! Given both of these reasons, it felt like a good starting point. The architecture we built does not limit us to this, however.
That's not trying to route to pods at all, its trying to route to the host. Our default consul helm chart will deploy clients using If there are any configuration options you'd want opened up to your use case, please let us know and we'll take a look! |
This is going to be a big improvement for us as well. We have flat routable pod IPs and would like to avoid using NodePort Services. When can we expect this feature go live? |
Support for optionally syncing ClusterIP services has been merged and will be released shortly! |
# This is the 1st commit message: Add service for terminating-gateways # This is the commit message #2: Add gateway-kind:terminating to deployment # This is the commit message #3: Add registration path for terminating gateways # This is the commit message #4: Add BATS tests # This is the commit message #5: Remove registration from terminating gateways deployment # This is the commit message #6: Set ports AFAIK in service # This is the commit message #7: Begin setting values for endpoints controller # This is the commit message #8: Copy values from deployment to endpoints controller (as comment) # This is the commit message #9: Use connect-init instead of acl-init # This is the commit message #10: Remove guards from term gw service (they will get hit by the deployment) # This is the commit message #11: Range over gateways to produce a service for each deployment # This is the commit message #12: Add test for multiple gateways # This is the commit message #13: Remove the format script # This is the commit message #14: Note which parts of the config have been set
Context: hashicorp/consul#4710 (comment)
We should support ClusterIP by using endpoints since we already assume that pods are routable given how we treat NodePort.
This is a good first issue because we already have the machinery to sync endpoints (for NodePort) and we already have test examples showing how this would work, so this is a great way to dive in and enhance the functionality.
/cc @roboll
The text was updated successfully, but these errors were encountered: