Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add support for latency-based routing on AWS #571

Closed
kaazoo opened this issue May 25, 2018 · 18 comments
Closed

Add support for latency-based routing on AWS #571

kaazoo opened this issue May 25, 2018 · 18 comments
Labels
lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed. provider/aws

Comments

@kaazoo
Copy link

kaazoo commented May 25, 2018

Route53 on AWS supports "latency-based routing" for DNS records. You can have multiple DNS records for the same hostname, having different ALIAS to regional ELBs.
This is usually the preferred way of having regional failover and low latency for multi-region deployments.

@cristim
Copy link

cristim commented Jun 13, 2018

I'd like to implement this, unless someone else is working on it.

cristim added a commit to cristim/external-dns that referenced this issue Jun 13, 2018
@cristim
Copy link

cristim commented Jun 13, 2018

@hjacobs please have a look at 4cd8257 and let me know if you have any concerns. Should I maybe make this configurable with an additional annotation?

The current change passes the unit tests but I didn't yet run it against an actual environment.

@hjacobs
Copy link
Contributor

hjacobs commented Jun 14, 2018

@cristim looking through your mentioned commit, I don't really know what it does: would it enable latency based routing "always"? Is there also an AWS cost factor?

@cristim
Copy link

cristim commented Jun 14, 2018

@hjacobs indeed, I just had a look and it turns out the cost per DNS request is 50% more than the simple records: https://aws.amazon.com/route53/pricing/

From my experience it's still often negligible when compared to the other infrastructure costs, but I guess this makes sense to be an opt-in feature since there are many people out there where it doesn't give any additional value so they shouldn't pay an extra price for it.

I'll try to make this configurable and extensible to other Route53 record types that may be supported later (geolocation, weighting, etc.).

@meringu
Copy link

meringu commented Nov 2, 2018

+💯

@alfredkrohmer
Copy link
Contributor

@cristim Any updates on this?

@cristim
Copy link

cristim commented Dec 23, 2018

@devkid I stopped working on this, and I am now unable to resume for the next couple of months. If you are interested feel free to pick up from where I left it.

@fejta-bot
Copy link

Issues go stale after 90d of inactivity.
Mark the issue as fresh with /remove-lifecycle stale.
Stale issues rot after an additional 30d of inactivity and eventually close.

If this issue is safe to close now please do so with /close.

Send feedback to sig-testing, kubernetes/test-infra and/or fejta.
/lifecycle stale

@k8s-ci-robot k8s-ci-robot added the lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. label Apr 27, 2019
@alfredkrohmer
Copy link
Contributor

I'm working on this now.

@alfredkrohmer
Copy link
Contributor

/remove-lifecycle stale

@k8s-ci-robot k8s-ci-robot removed the lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. label Apr 28, 2019
@fejta-bot
Copy link

Issues go stale after 90d of inactivity.
Mark the issue as fresh with /remove-lifecycle stale.
Stale issues rot after an additional 30d of inactivity and eventually close.

If this issue is safe to close now please do so with /close.

Send feedback to sig-testing, kubernetes/test-infra and/or fejta.
/lifecycle stale

@k8s-ci-robot k8s-ci-robot added the lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. label Jul 27, 2019
@aimanparvaiz
Copy link

would be great to have this.

@fejta-bot
Copy link

Stale issues rot after 30d of inactivity.
Mark the issue as fresh with /remove-lifecycle rotten.
Rotten issues close after an additional 30d of inactivity.

If this issue is safe to close now please do so with /close.

Send feedback to sig-testing, kubernetes/test-infra and/or fejta.
/lifecycle rotten

@k8s-ci-robot k8s-ci-robot added lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed. and removed lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. labels Aug 29, 2019
@fejta-bot
Copy link

Rotten issues close after 30d of inactivity.
Reopen the issue with /reopen.
Mark the issue as fresh with /remove-lifecycle rotten.

Send feedback to sig-testing, kubernetes/test-infra and/or fejta.
/close

@k8s-ci-robot
Copy link
Contributor

@fejta-bot: Closing this issue.

In response to this:

Rotten issues close after 30d of inactivity.
Reopen the issue with /reopen.
Mark the issue as fresh with /remove-lifecycle rotten.

Send feedback to sig-testing, kubernetes/test-infra and/or fejta.
/close

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@cristim
Copy link

cristim commented Apr 6, 2020

@AlaaMansourTW apparently yes, see #1008.

@ghost
Copy link

ghost commented Apr 6, 2020

@cristim
Yes, managed to get it done with - --txt-prefix and having a unique identifier

@jnicholls
Copy link

I think this would be an excellent feature to be expressible via kube semantics, like other cloud-provider-aws and external-dns features are. Is this issue on anyone's radar at all?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed. provider/aws
Projects
None yet
Development

No branches or pull requests

9 participants