Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Why we need the enable-service-topology config option? #25283

Closed
ialidzhikov opened this issue May 5, 2023 · 6 comments
Closed

Why we need the enable-service-topology config option? #25283

ialidzhikov opened this issue May 5, 2023 · 6 comments
Labels
area/loadbalancing Impacts load-balancing and Kubernetes service implementations sig/datapath Impacts bpf/ or low-level forwarding details, including map management and monitor messages. stale The stale bot thinks this issue is old. Add "pinned" label to prevent this from becoming stale.

Comments

@ialidzhikov
Copy link

ialidzhikov commented May 5, 2023

#17929 added a TopologyAwareHints (topology-aware traffic routing) feature implementation for cilium.
However this feature put behind the config option enable-service-topology and it is disabled by default. Hence, a cluster admin has to enable it explicitly for cilium.
So the question we raised internally is: what is the benefit of this enable-service-topology config option? For making a Service topology-aware, the Service has to be annotated with service.kubernetes.io/topology-aware-hints=auto. So, the question is what is the benefit of enable-service-topology when the feature is already configurable per Service basis.
For comparison, on kube-proxy side the feature is behind the feature gate TopologyAwareHints and it is enabled by default since K8s 1.24. The feature gate will be removed after it is GA. Hence, the feature on kube-proxy side is enabled by default and in the future it won't be possible to disable it.

@ialidzhikov
Copy link
Author

/cc @aojea @robscott

@ialidzhikov
Copy link
Author

/cc @brb

@aojea
Copy link
Contributor

aojea commented May 5, 2023

it seems this was answered here during the review https://github.com/cilium/cilium/pull/17929/files#r753157675, it makes sense to start disabled by default on alpha features

@ScheererJ
Copy link

The initial reasoning for setting it to disabled per default makes sense. Meanwhile, some time has passed and the kubernetes feature moved to beta (enabled by default). Should this then also be applied to cilium or has this a different lifecycle? In other words: When could we expect this option to be GA/enabled by default?

@joestringer joestringer added sig/datapath Impacts bpf/ or low-level forwarding details, including map management and monitor messages. area/loadbalancing Impacts load-balancing and Kubernetes service implementations labels May 5, 2023
@github-actions
Copy link

github-actions bot commented Jul 7, 2023

This issue has been automatically marked as stale because it has not
had recent activity. It will be closed if no further activity occurs.

@github-actions github-actions bot added the stale The stale bot thinks this issue is old. Add "pinned" label to prevent this from becoming stale. label Jul 7, 2023
@github-actions
Copy link

This issue has not seen any activity since it was marked stale.
Closing.

@github-actions github-actions bot closed this as not planned Won't fix, can't repro, duplicate, stale Jul 22, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/loadbalancing Impacts load-balancing and Kubernetes service implementations sig/datapath Impacts bpf/ or low-level forwarding details, including map management and monitor messages. stale The stale bot thinks this issue is old. Add "pinned" label to prevent this from becoming stale.
Projects
None yet
Development

No branches or pull requests

4 participants