Feature Implement Unix Domain Socket based connectivity for Envoy->XDS server for gateway.#348
Conversation
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: ashishkpathak-connect The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
|
Welcome @ashishkpathak-connect! |
|
Hi @ashishkpathak-connect. Thanks for your PR. I'm waiting for a github.com member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
|
Tests Test - Ref - #309 (comment) |
|
how will this work on windows or mac where the containers run in a vm ? |
…teway XDS Server. Implement Unix Domain Socket based connectivity for Envoy to connect to XDS server for gateway. Updated tests
e19cb3f to
ceb6c05
Compare
@aojea The test report(pdf) I've attached is from Mac itself. I am unsure how I can test for windows currently. Whats your view on this? It wouldn't work on windows? Can we somehow try testing this PR for windows? |
|
here is the thing, cloud provider kind can run standalone in the host or as a container. |
Thanks @aojea I was testing by running cloud-provider-kind on the Mac host by directly running the binary with root perms. I get your point now, if we run cpk as docker container and if we use Unix Domain Socket, then we need somehow to mount the socket to cpu container. |
no worries, the project grew in scope based on user feedback and this seems to be a common case now, is normal most people skipped it, but I love this solution based on sharing the unix domain socket, wonder if we can generalize it 🤔 |
With Generalize, were you referring to be able to use this solution across windows, Mac, linux + host/container right? Do you have any ideas? |
that is the tricky problem, people expect the project to work in any environment, so we can not develop a feature that only works in some of them or we break the others ... the reverse tunnel should work because we can expose ports from the container, so we are able to connect to specific ports in the containers from the host |
Totally agreed @aojea In our case, we have setup like below As per my understanding for our setup, wherein we want to expose a port of Envoy and GatewayServer to make a gRPC dialup to Envoy's port which then Envoy uses it as a reverse connection for xDS is not possible currently. |
well, these are network tunnels and I was wondering if envoy dataplane is able to reverse tunnel any kind of traffic, I was assuming envoy will not have a real notion if it is its own traffic or not ... then it may work |
|
The Kubernetes project currently lacks enough contributors to adequately respond to all PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
|
The Kubernetes project currently lacks enough active contributors to adequately respond to all PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
Implement Unix Domain Socket based connectivity for Envoy to connect to XDS server for gateway.
Fixes #309