Conversation
|
Hi @kiall. Thanks for your PR. I'm waiting for a kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
/ok-to-test |
311d585 to
634c753
Compare
|
would welcome support for this! |
|
It would be great to have support for mixed protocol LBs. |
|
@kiall any progress on this PR? |
There was a problem hiding this comment.
Can you expand a little on the reasoning for an annotation? A check if a Service contains ports for more than one protocol shouldn't be too hard to write and could be used as a basis for having providers that do not support that emit an event. Or are there more reasons for having it?
There was a problem hiding this comment.
Really, I think the annotation should be little more than a stopgap measure to handle compatibility and allow people (i.e. CPI vendors) time to update - I gave some detail in the PR message above.
For new features, it's preferable to add a feature gate instead of annotations. For the first release, it may be alpha so that users can try it. And in later beta releases, enable it by default. |
|
@kiall Do you currently have the capacity to continue with this? Else I'd like to go ahead and write a KEP for the validation changes to make sure we manage to get this in within the 1.17 cycle |
|
Any update? Some game developer deploy their application used mixed protocols. when use the k8s to deploy it, mixed protocols was not supported in service. |
|
Does it really need a KEP and a feature gate? Looks more like a bugfix to me. |
|
Tim says it was originally disabled because there were possibilities for "being charged twice" depending on your cloud provider. Also Tim wants it to be opt-in. We need a KEP for this first to explore the issues and proposed solutions. |
|
@kiall: PR needs rebase. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
But "being charged twice" is possible only if someone enabled this in their config, so what's the problem? And who cares that some cloud provider can't do their job right? |
|
Any update on this? without this, we have to create several service for each port, which is inconvenient. |
|
Any updates? We also really need mixed protocal. |
|
Oh my god, can anyone solve the conflicts? We really need mixed protocols for our SIP infrastructure. |
|
The KEP pull request is on its way to kubernetes/enhancements. Please check and comment. |
|
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
|
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
|
/remove-lifecycle rotten
|
|
@prestonvanloon I don't think there is much point in keeping this PR open, there is a KEP for this, discussion should continue there: kubernetes/enhancements#1438 or the issue at #23880 |
|
OK thanks. I hadn't seen those links yet.
… |
|
Let's continue discussion in #23880 since there is now a merged KEP added /close |
|
@cmluciano: Closed this PR. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
What type of PR is this?
/kind feature
What this PR does / why we need it:
This PR adds support for configuring a service of type LoadBalancer with more than 1 protocol. For example, this allows configuring a LoadBalancer with both TCP and UDP port 53 (for a DNS server), or TCP and UDP 443 for HTTPS + QUIC (HTTP 3.0).
Which issue(s) this PR fixes:
Fixes #23880
Special notes for your reviewer:
Mixed protocol LBs are supported by Azure and MetalLB. Other providers MAY support this, however, I'm unable to verify the implementations and have opted to reject mixed protocol LBs on these CPIs where necessary (this turned out to only need rejection in the GCP provider)
An example service to enable and use this feature:
If the feature gate is enabled, while a CPI without support is enabled, the following event will be recorded:
Does this PR introduce a user-facing change?: