-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Egress support for Network Policy #366
Comments
@cmluciano @kubernetes/sig-network-feature-requests any updates for 1.8? Is this feature still on track for the release? |
Yes PR is approved and is currently running through the CI tests kubernetes/kubernetes#51351 |
@cmluciano any update on missing docs? The PR is due today. |
@caseydavenport @cmluciano mentioned you as the contact for docs. We need them ASAP in order to make the 1.8 release docs. |
Docs PR is here: kubernetes/website#5529 |
this was merged for 1.8 |
@cmluciano any progress is planned for 1.9? |
We don't want to move to GA for 1.9 until the features have been battle-tested more. I would expert GA for this feature and ipBlock within the 1.10 timeframe. |
Can you reopen the issue please, and simply bump it from 1.8 milestone?
I don't want us to lose the feature tracking for the future implementations.
On Oct 23, 2017 9:51 PM, "cmluciano" <[email protected]> wrote:
We don't want to move to GA for 1.9 until the features have been
battle-tested more. I would expert GA for this feature and ipBlock within
the 1.10 timeframe.
—
You are receiving this because you commented.
Reply to this email directly, view it on GitHub
<#366 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/AAHOu8qB7FYoaIUsC2to_Un5BGjA1Yc4ks5svO5LgaJpZM4Om0NI>
.
|
@cmluciano @kubernetes/sig-network-feature-requests still on track for 1.10? |
This is still under discussion in the mailing list. |
@cmluciano any progress? |
Yes, from our mailing list conversations this feature with not GA in 1.10. We will continue discussing potential for future releases on the sig-network mailing list. |
IMHO egress (including ipBlock-based egress) is ready for GA, but ipBlock-based ingress is not, and in fact should be deprecated. (We still never defined whether it interacts with cluster ingress; if it does, then it's basically impossible to implement, and if it doesn't, then it's basically useless.) |
please ignore my comment, I responded and re-read the ipblock piece. Follow up is how does deprecating this impact |
/milestone v1.12 |
@cmluciano this should work: Also milestones is not yet supported afaik. |
Thanks for the update. I've added this to the 1.12 tracking sheet. |
@danwinship can you please expand on the problems with ipBlock-based ingress? If source IP is maintained to the pod from outside the cluster, wouldn't that give a reasonable use case for keeping the support? We often use Calico host-based policies for ipBlock-based ingress, but it seems that Kubernetes policies could work as well. |
@rtheis yes, if the source IP is maintained then the network plugin can implement ipBlock-based ingress, but some cluster-ingress mechanisms aren't able to maintain the source IP, and the network plugin generally has no control over the behavior of the cluster ingress mechanisms anyway (and there are multiple different cluster ingress mechanisms that work in completely different ways, and people can invent new ones that old network plugins won't know about). If we want ipBlock-based ingress rules to work with cluster ingress, then we need to define how they work. (Cluster ingress mechanisms are required to preserve source IP? Cluster ingress mechanisms are required to communicate source IP to the network plugin via some out-of-band mechanism? Cluster ingress mechanisms are responsible for implementing the ipBlock-ingress part of NetworkPolicy themselves, separately from the network plugin?) |
@danwinship thank you. I agree, there are plenty of challenges with ipBlock-based ingress. |
Hey there! @cmluciano I'm the wrangler for the Docs this release. Is there any chance I could have you open up a docs PR against the release-1.12 branch as a placeholder? That gives us more confidence in the feature shipping in this release and gives me something to work with when we start doing reviews/edits. Thanks! If this feature does not require docs, could you please update the features tracking spreadsheet to reflect it? |
@zparnold Yes. Is this just bumping the CHANGELOG? |
That is a great question! I unfortunately don't know enough about this feature to know whether or not it's just a CHANGELOG bump. |
@thockin @caseydavenport @danwinship Aside from ample test coverage, do we need to add anything else for this feature to be GA? |
I just filed kubernetes/website#10151 but while that came out of this discussion, it's not 1.12-specific; the clarifications (assuming everyone agrees we want them) apply to the 1.11 version of the features as well. I don't think we need any further new documentation. I think egress is already as well covered by e2e tests as ingress is. So... I think we're good? |
SGTM, so I just need to remove the notes on beta from the API docs and then ensure that it is displayed properly elsewhere |
Thanks! Do we need to modify 1.12 for this or 1.11? Sorry, it was hard for
me to understand.
…On Thu, Aug 30, 2018 at 9:36 AM cmluciano ***@***.***> wrote:
SGTM, so I just need to remove the notes on beta from the API docs and
then ensure that it is displayed properly elsewhere
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#366 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/AE81SHz-ciq8HLLdxmNw8MKDSsMNzhJMks5uWBSIgaJpZM4Om0NI>
.
|
…plate-generation Add template generation to DaemonSet upgrade proposal
1.11 is unchanged. The feature is GA in 1.12. |
@cmluciano @danwinship -- do we have the requisite docs, tests, etc. to graduate this for 1.12? |
The only missing thing would be to remove the note about it being beta in the code comments. I reviewed https://github.com/kubernetes/community/blob/master/contributors/devel/api_changes.md#alpha-field-in-existing-api-version and did not come across anything that indicates if we just remove them to indicate "GA-ness". Can someone from @kubernetes/sig-api-machinery-api-reviews comment on this? |
Seeing as how this has graduated to GA in 1.12 I'm going to close the issue. Nice work, all! /close |
@kacole2: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Feature Description
The text was updated successfully, but these errors were encountered: