Skip to content

Commit f7b4857

Browse files
authored
Merge pull request #7838 from danwinship/sig-network-2023
update sig-network 2023 report
2 parents 384d42f + 8396f7c commit f7b4857

File tree

1 file changed

+84
-23
lines changed

1 file changed

+84
-23
lines changed

sig-network/annual-report-2023.md

Lines changed: 84 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -4,54 +4,111 @@
44

55
1. What work did the SIG do this year that should be highlighted?
66

7-
<!--
8-
Some example items that might be worth highlighting:
9-
- Major KEP advancement
10-
- Important initiatives that aren't tracked via KEPs
11-
- Paying down significant tech debt
12-
- Governance and leadership changes
13-
-->
7+
- Governance and leadership changes
8+
9+
- Casey Davenport (**[@caseydavenport](https://github.com/caseydavenport)**)
10+
and Dan Williams (**[@dcbw](https://github.com/dcbw)**) stepped
11+
down as Chairs, Shane Utt (**[@shaneutt](https://github.com/shaneutt)**) and
12+
Mike Zappa (**[@mikezappa87](https://github.com/mikezappa87)**) became new
13+
Chairs (joining Tim Hockin (**[@thockin](https://github.com/thockin)**), who
14+
remained a Chair)
15+
16+
- Dan Winship (**[@danwinship](https://github.com/danwinship)**) and
17+
Antonio Ojea (**[@aojea](https://github.com/aojea)**) became SIG Network's
18+
first Tech Leads.
19+
20+
- Gateway API
21+
22+
The [Gateway API reached v1.0 and is now GA!]. Specifically, the
23+
`Gateway`, `GatewayClass`, and `HTTPRoute` APIs are now v1, with
24+
several other APIs also being added or updated in the experimental
25+
channel. Also, the old validation webhook is now deprecated in
26+
favor of CEL-based validation. See [the v1.0.0 release notes] for
27+
full details.
28+
29+
[Gateway API reached v1.0 and is now GA!]: https://kubernetes.io/blog/2023/10/31/gateway-api-ga/
30+
[the v1.0.0 release notes]: https://github.com/kubernetes-sigs/gateway-api/releases/tag/v1.0.0
31+
32+
- NetworkPolicy API Working Group
33+
34+
The Network Policy API WG mainly focused on the maintenance and
35+
new feature development regarding our two major APIs,
36+
AdminNetworkPolicy and BaselineAdminNetworkPolicy. This also
37+
included a few talks at KubeCon NA 2023 in Chicago:
38+
39+
- [Network Policy API: Intro and Project Update]
40+
- [AdminNetworkPolicy: A New Kubernetes-Native API for Comprehensive Cluster-Wide Network Security]
41+
42+
Additionally, major features such as [Egress Traffic Control],
43+
[FQDN Selectors] and [Network Tenancy] all made great progress
44+
during the year and we are excited to deliver them here in 2024.
45+
46+
On top of the APIs and Features, we introduced the
47+
[Policy-Assistant] tool which allows users to have a better overview
48+
of how all of the native Kubernetes APIs interact on real
49+
clusters.
50+
51+
[Network Policy API: Intro and Project Update]: https://youtu.be/lYWW3KogPTg?si=c6vpOwWMp5D6GpMM
52+
[AdminNetworkPolicy: A New Kubernetes-Native API for Comprehensive Cluster-Wide Network Security]: https://youtu.be/DTxvTCISi7Q?si=pz8RN35ptn8eFeE5
53+
[Egress Traffic Control]: https://network-policy-api.sigs.k8s.io/npeps/npep-126-egress-traffic-control/
54+
[FQDN Selectors]: https://network-policy-api.sigs.k8s.io/npeps/npep-133/
55+
[Network Tenancy]: https://network-policy-api.sigs.k8s.io/npeps/npep-122/
56+
[Policy-Assistant]: https://github.com/kubernetes-sigs/network-policy-api/tree/main/cmd/policy-assistant
1457

1558
2. Are there any areas and/or subprojects that your group needs help with (e.g. fewer than 2 active OWNERS)?
1659

17-
<!--
18-
Note: This list is generated from the KEP metadata in kubernetes/enhancements repository.
19-
If you find any discrepancy in the generated list here, please check the KEP metadata.
20-
Please raise an issue in kubernetes/community, if the KEP metadata is correct but the generated list is incorrect.
21-
-->
60+
The Network Policy API group is always looking for more people to get
61+
involved. Whether that's trying out our APIs, updating docs, or
62+
helping our with NPEP design, we are hugely appreciative of all help.
63+
Please checkout [our website](https://network-policy-api.sigs.k8s.io/)
64+
for even more information.
65+
66+
Historically, SIG Network as a whole has not been great at onboarding
67+
new contributors, but contributions are definitely welcome. (There has
68+
recently been a flurry of [new-contributor effort around the new
69+
nftables kube-proxy backend].)
70+
71+
We also continue to have problems with Windows networking, where most
72+
of the people who regularly attend SIG Network meetings know very
73+
little about Windows (and most of the people who regularly attend SIG
74+
Windows meetings know very little about networking). If you know a lot
75+
about Windows container networking (or want to learn) and want to get
76+
involved, it would be greatly appreciated.
77+
78+
[new-contributor effort around the new nftables kube-proxy backend]: https://github.com/kubernetes/kubernetes/issues/122572
2279

2380
3. Did you have community-wide updates in 2023 (e.g. KubeCon talks)?
2481

25-
<!--
26-
Examples include links to email, slides, or recordings.
27-
-->
82+
We gave a SIG update at KubeCon EU: [SIG Network: Intro and Updates].
83+
84+
[SIG Network: Intro and Updates]: https://www.youtube.com/watch?v=0uPEFcWn-_o
2885

2986
4. KEP work in 2023 (v1.27, v1.28, v1.29):
3087

3188
- Alpha
32-
- [1860 - Make Kubernetes aware of the load balancer behaviour](https://github.com/kubernetes/enhancements/tree/master/keps/sig-network/1860-kube-proxy-IP-node-binding) - v1.29
33-
- [1880 - Multiple Service CIDRs](https://github.com/kubernetes/enhancements/tree/master/keps/sig-network/1880-multiple-service-cidrs) - v1.27
34-
- [3836 - Kube-proxy improved ingress connectivity reliability](https://github.com/kubernetes/enhancements/tree/master/keps/sig-network/3836-kube-proxy-improved-ingress-connectivity-reliability) - v1.28
89+
- [1880 - Multiple Service CIDRs](https://github.com/kubernetes/enhancements/tree/master/keps/sig-network/1880-multiple-service-cidrs) - v1.29
3590
- [3866 - Add an nftables-based kube-proxy backend](https://github.com/kubernetes/enhancements/tree/master/keps/sig-network/3866-nftables-proxy) - v1.29
3691
- [4004 - Deprecate status.nodeInfo.kubeProxyVersion field](https://github.com/kubernetes/enhancements/tree/master/keps/sig-network/4004-deprecate-kube-proxy-version) - v1.29
3792

3893
- Beta
39-
- [2681 - Field status.hostIPs added for Pod](https://github.com/kubernetes/enhancements/tree/master/keps/sig-network/2681-pod-host-ip) - v1.29
40-
- [3458 - Remove transient node predicates from KCCM's service controller](https://github.com/kubernetes/enhancements/tree/master/keps/sig-network/3458-remove-transient-node-predicates-from-service-controller) - v1.27
41-
- [3705 - Cloud Dual-Stack --node-ip Handling](https://github.com/kubernetes/enhancements/tree/master/keps/sig-network/3705-cloud-node-ips) - v1.29
94+
- [1860 - Make Kubernetes aware of the load balancer behaviour](https://github.com/kubernetes/enhancements/tree/master/keps/sig-network/1860-kube-proxy-IP-node-binding) - v1.30
95+
- [3836 - Kube-proxy improved ingress connectivity reliability](https://github.com/kubernetes/enhancements/tree/master/keps/sig-network/3836-kube-proxy-improved-ingress-connectivity-reliability) - v1.30
4296

4397
- Stable
4498
- [1669 - Proxy Terminating Endpoints](https://github.com/kubernetes/enhancements/tree/master/keps/sig-network/1669-proxy-terminating-endpoints) - v1.28
45-
- [2091 - Add support for AdminNetworkPolicy resources](https://github.com/kubernetes/enhancements/tree/master/keps/sig-network/2091-admin-network-policy) - v1.27
46-
- [2438 - Dual Stack API Server](https://github.com/kubernetes/enhancements/tree/master/keps/sig-network/2438-dual-stack-apiserver) - v1.27
4799
- [2595 - Expanded DNS Configuration](https://github.com/kubernetes/enhancements/tree/master/keps/sig-network/2595-expanded-dns-config) - v1.28
100+
- [2681 - Field status.hostIPs added for Pod](https://github.com/kubernetes/enhancements/tree/master/keps/sig-network/2681-pod-host-ip) - v1.30
48101
- [3178 - Cleaning up IPTables Chain Ownership](https://github.com/kubernetes/enhancements/tree/master/keps/sig-network/3178-iptables-cleanup) - v1.28
49102
- [3453 - Minimize iptables-restore input size](https://github.com/kubernetes/enhancements/tree/master/keps/sig-network/3453-minimize-iptables-restore) - v1.28
103+
- [3458 - Remove transient node predicates from KCCM's service controller](https://github.com/kubernetes/enhancements/tree/master/keps/sig-network/3458-remove-transient-node-predicates-from-service-controller) - v1.30
50104
- [3668 - Reserve Nodeport Ranges For Dynamic And Static Port Allocation](https://github.com/kubernetes/enhancements/tree/master/keps/sig-network/3668-reserved-service-nodeport-range) - v1.29
105+
- [3705 - Cloud Dual-Stack --node-ip Handling](https://github.com/kubernetes/enhancements/tree/master/keps/sig-network/3705-cloud-node-ips) - v1.30
51106
- [3726 - standard-application-protocols](https://github.com/kubernetes/enhancements/tree/master/keps/sig-network/3726-standard-application-protocols) - v1.27
52107

53108
## [Subprojects](https://git.k8s.io/community/sig-network#subprojects)
54109

110+
(This list is auto-generated and has reminded us that we should
111+
probably update our list of subprojects...)
55112

56113
**Continuing:**
57114
- cluster-proportional-autoscaler
@@ -67,8 +124,12 @@
67124

68125
## [Working groups](https://git.k8s.io/community/sig-network#working-groups)
69126

127+
(This list is also auto-generated and is even less accurate than the
128+
above list...)
129+
70130
**Retired in 2023:**
71131
- Multitenancy
132+
72133
**Continuing:**
73134
- IoT Edge
74135
- Policy

0 commit comments

Comments
 (0)