-
Notifications
You must be signed in to change notification settings - Fork 39.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Node-local services #28610
Comments
@thockin This is also very useful for node problem detector. Both node problem detector and kube-proxy are running as DaemonSet. If we want kube-proxy to report problem to node problem detector via network, we can rely on specific port in host network now. |
I created #28637. Feel free to poke holes in it. |
Another example i would like to add is linkerd. https://linkerd.io |
👍 |
@therc There are no sig labels on this issue. Please add a sig label by: |
/sig network |
Ping? |
@thockin is this still the relevant issue? you mentioned this work was ongoing at the London Kubernetes meetup a few weeks ago |
This issue is definitely still relevant for our team. Are there any obstacles to merging #28637? |
This is also relevant for us. Any updates? |
Kludge until this gets resolved:
|
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Please keep this in mind. |
👍 |
/remove-lifecycle stale |
Can anyone familiar with the work, give an update on how far off we are from having this fixed? The arbitrary topology stuff seems cool, but its also giving me a growing feeling that a case of architecture astronautics is taking place. Has anyone built a node local proxy or something else to fix this? LinkerD looks interesting my primary use for this needs UDP support. (Metrics/StatsD, etc) |
We cut out the complicated stuff and are trying to make it as simple as
possible. See kubernetes/community#2846 - we hope
to have this KEP accepted this cycle (meaning really soon). Then
implementation would happen in 1.14 timeframe (for alpha).
…On Wed, Nov 14, 2018 at 9:01 PM Samuel Bishop ***@***.***> wrote:
Can anyone familiar with the work, give an update on how far off we are
from having this fixed? The arbitrary topology stuff seems cool, but its
also giving me a growing feeling that a case of *architecture
astronautics* is taking place. Has anyone built a node local proxy or
something else to fix this? LinkerD looks interesting my primary use for
this needs UDP support. (Metrics/StatsD, etc)
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub
<#28610 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/AJB4s9mrKm2vqKESmI0E0wciuYjVUsQhks5uvPU0gaJpZM4JHPm7>
.
|
@johnbelamaric Thanks for referencing that KEP. I didn't see that one while I was reading and following the different chain of links to other issues/repos/etc to see how things were progressing. |
Available as alpha in 1.17: https://kubernetes.io/docs/concepts/services-networking/service-topology/ /close |
@johnbelamaric: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Sometimes users require daemons to run on each node. Scheduling them is easy, with DaemonSets. Discovery is more complicated and currently requires e.g. iptables hacks that bypass Kubernetes altogether. Possible use cases:
At the very least, this new kind of services should support 1:1 service->daemon mapping. For cases like loasd, it would be ideal to support N:1 (a number of services all getting forwarded to the same daemon, with the daemon able to tell which service each connection was meant for).
cc @thockin
The text was updated successfully, but these errors were encountered: