-
Notifications
You must be signed in to change notification settings - Fork 2.8k
feat: add support for ingress backed GlooEdge Gateway #5909
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
feat: add support for ingress backed GlooEdge Gateway #5909
Conversation
Welcome @cucxabong! |
Hi @cucxabong. Thanks for your PR. I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
da56738
to
c996a08
Compare
lgtm |
c996a08
to
a8c674c
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Was it tested on real cluster? What was your kubernetes manifests and results?
However, in some setups, the Gateway's Service is of type ClusterIP, with all public traffic routed to it via a separate Kubernetes Ingress object. This setup leaves the Gateway without a public IP that ExternalDNS can discover. | ||
|
||
- **The Solution**: The annotation on the Istio Gateway tells ExternalDNS to ignore the Gateway's Service IP. Instead, it directs ExternalDNS to a specified Ingress resource to find the target LoadBalancer IP address. | ||
- **The Solution**: The annotation on the Istio/GlooEdge Gateway tells ExternalDNS to ignore the Gateway's Service IP. Instead, it directs ExternalDNS to a specified Ingress resource to find the target LoadBalancer IP address. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Could you add at least single use case? Example https://github.com/kubernetes-sigs/external-dns/blob/master/docs/annotations/annotations.md#use-cases-for-external-dnsalphakubernetesiohostname-annotation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I added our use case
/ok-to-test |
Pull Request Test Coverage Report for Build 18590290273Details
💛 - Coveralls |
a8c674c
to
f9dec1c
Compare
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
@ivankatliarchuk yes, I did a test on our sandbox env in |
f9dec1c
to
3b2a8e7
Compare
What does it do ?
fix #5908
More