Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Ability to specify which namespaces policy-controller listens to #13242

Open
DerekTBrown opened this issue Oct 29, 2024 · 3 comments
Open

Ability to specify which namespaces policy-controller listens to #13242

DerekTBrown opened this issue Oct 29, 2024 · 3 comments

Comments

@DerekTBrown
Copy link
Contributor

What problem are you trying to solve?

  • I have various k8s namespaces that I do not need/want the Linkerd policy-controller or policy-validator to watch/modify.
  • There isn't a way to specify which namespaces should/shouldn't be watched.

How should the problem be solved?

  • This can be solved by adding a flag to the policy-controller that is passed into the K8s runtime watcher.

Any alternatives you've considered?

  • I haven't been able to find a solution, short of maintaining a hard-fork of linkerd.

How would users interact with this feature?

No response

Would you like to work on this feature?

yes

@kflynn
Copy link
Member

kflynn commented Oct 31, 2024

@DerekTBrown, can you give a little more detail here? Are these namespaces that you want to be unmeshed, or namespaces that you don't want meshed workloads to be able to route to, or... ?

@DerekTBrown
Copy link
Contributor Author

@DerekTBrown, can you give a little more detail here? Are these namespaces that you want to be unmeshed, or namespaces that you don't want meshed workloads to be able to route to, or... ?

The immediate issue we are seeing is with multiple controllers in conflict. We have a different Gateway API controller that handles HTTPRoute in our clusters. We need a mechanism to indicate which controller is responsible for a given HTTPRoute to avoid the two repeatedly clobbering controllerName and other fields.

A longer-term need for this is to reduce the load on the policy-controller. We have a number of unmeshed workloads that we don't need to be tracked by linkerd.

@DerekTBrown
Copy link
Contributor Author

Issue on the Gateway API: kubernetes-sigs/gateway-api#3444

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants