-
Notifications
You must be signed in to change notification settings - Fork 91
UDP support #62
Comments
Do we need to handle UDP now? If we only trap tcp traffic, applications can
continue to use kube proxy as is for UDP right?
Until we have a solid use case for UDP and UDP routing or mixer related
stuff, it seems pointless to bloat envoy codebase with unnecessary
complexity.
On Thu, Jan 26, 2017 at 7:18 PM Kuat ***@***.***> wrote:
Proxy manager should be in charge of routing UDP traffic. There are many
pieces needed for this to work:
- Envoy UDP routing support
- IP tables rules to trap UDP traffic
- Code to handle UDP protocol in the Manager services model
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub
<#62>, or mute the thread
<https://github.com/notifications/unsubscribe-auth/AH0qd5lqmPJdmxhHlhGXJ4eD239ROHEfks5rWTfSgaJpZM4LvToe>
.
--
~shriram
|
This is not a high priority item. As of now, we're not handling UDP traffic
at all, and don't have a good use case why we should.
On Thu, Jan 26, 2017, 4:41 PM Shriram Rajagopalan <notifications@github.com>
wrote:
… Do we need to handle UDP now? If we only trap tcp traffic, applications can
continue to use kube proxy as is for UDP right?
Until we have a solid use case for UDP and UDP routing or mixer related
stuff, it seems pointless to bloat envoy codebase with unnecessary
complexity.
On Thu, Jan 26, 2017 at 7:18 PM Kuat ***@***.***> wrote:
> Proxy manager should be in charge of routing UDP traffic. There are many
> pieces needed for this to work:
>
> - Envoy UDP routing support
> - IP tables rules to trap UDP traffic
> - Code to handle UDP protocol in the Manager services model
>
> —
> You are receiving this because you are subscribed to this thread.
> Reply to this email directly, view it on GitHub
> <#62>, or mute the thread
> <
https://github.com/notifications/unsubscribe-auth/AH0qd5lqmPJdmxhHlhGXJ4eD239ROHEfks5rWTfSgaJpZM4LvToe
>
> .
>
--
~shriram
—
You are receiving this because you authored the thread.
Reply to this email directly, view it on GitHub
<#62 (comment)>, or mute
the thread
<https://github.com/notifications/unsubscribe-auth/AJGIxh09sriOe9luRa89y_gbwFyywHcTks5rWT0ggaJpZM4LvToe>
.
|
@moderation you had a use case right? |
Yes. We are interested in using Envoy as an external service proxy for a PaaS. Typically this proxy will broker HTTP connections and TCP database connections etc. There are some people accessing Kafka external from the PaaS and the authentication scheme uses Kerberos and therefore requires UDP. Another potential use case is in the public cloud where creating an encrypted service mesh that can handle things like DNS and NTP. It looks like Nginx supports UDP load balancing / proxying but like a lot of their functionality it is only available in the commercial Nginx Plus product. |
@moderation, thanks for the use case. Will take a look at adding this
support to envoy.
On Tue, Feb 7, 2017 at 9:54 AM moderation ***@***.***> wrote:
Yes. We are interested in using Envoy as an external service proxy for a
PaaS. Typically this proxy will broker HTTP connections and TCP database
connections etc. There are some people accessing Kafka external from the
PaaS and the authentication scheme uses Kerberos and therefore requires UDP.
Another potential use case is in the public cloud where creating an
encrypted service mesh that can handle things like DNS and NTP.
It looks like Nginx supports UDP load balancing / proxying but like a lot
of their functionality it is only available in the commercial Nginx Plus
product.
—
You are receiving this because you commented.
Reply to this email directly, view it on GitHub
<#62 (comment)>, or mute
the thread
<https://github.com/notifications/unsubscribe-auth/AH0qd54r-5AYbd-2jzmJ_EXQpYaPjfQdks5raIWsgaJpZM4LvToe>
.
--
~shriram
|
+1 for UDP, needed for CoAP and LwM2M IoT scenarios. |
+1 for UDP support. Needed for IOT use cases; specifically LWM2M and CoAP protocols. |
Thanks for your interest. This is blocked by Envoy issue envoyproxy/envoy#492 |
Issue moved to istio/istio #1430 via ZenHub |
Proxy manager should be in charge of routing UDP traffic. There are many pieces needed for this to work:
The text was updated successfully, but these errors were encountered: