-
Notifications
You must be signed in to change notification settings - Fork 681
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Address not set on Ingress resource #403
Comments
Yup, this is a known limitation and a feature request that keeps getting bumped from release to release. Please don’t close his issue, I’ll close the other as a duplicate as you have put more details in this one.
… On 18 May 2018, at 23:41, Nick ***@***.***> wrote:
Contour does not set the IP value on the Ingress resource. This value is necessary for services like ExternalDNS to work properly.
Version
The version that https://j.hept.io/contour-deployment-norbac produces. Atm:
docker.io/envoyproxy/envoy-alpine:v1.6.0
gcr.io/heptio-images/contour:master (pointing to b9ede01f025)
Repro
Setup Contour in your cluster.
kubectl apply -f kubectl apply -f https://j.hept.io/contour-deployment-norbac
Deploy a simple service with Ingress rules.
kubectl apply -f https://gist.githubusercontent.com/nphmuller/1c980c72e2119b1482e19eb619def08f/raw/10331f4bbc18abe36a0c8c841bf70ab04a38eb92/service-with-ingress.yaml
(A) kubectl get ingress nginx
(B) kubectl get ingress nginx -o yaml
Expected
A. ADDRESS column should have external IP of Contour load balancer service, but is empty.
B. status should have value:
status:
loadBalancer:
ingress:
- ip: %External IP-of-Contour-LoadBalancer-service%
but has value:
status:
loadBalancer: {}
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub, or mute the thread.
|
@davecheney do you know if this will be done soon? |
I’m sorry this won’t make it for 0.6. I know it is important but resources are limited.
… On 1 Jun 2018, at 23:21, Alexandre Picard-Lemieux ***@***.***> wrote:
@davecheney do you know if this will be done soon?
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub, or mute the thread.
|
@davecheney Still appreciate all the effort! 👍 |
This should be possible to cover as part of the IngressRoute refactor. No ETA on a milestone. |
Hi @davecheney, I am using external-dns with Ingress and it require ADDRESS field to be set otherwise it will not create DNS records. |
I’m sorry I don’t have an eta when this issue will be worked on. |
I'm sorry to report that at this stage in the development freeze without a design we won't be able to deliver this for rc.2. Moving to the backlog for prioritisation after Contour 1.0 |
Adds the `--ingress-status-address` flag to specify what address should be added to Ingress `status.loadbalancer` stanza by Contour. Setting this flag will disable the automatic Envoy service watching for those details. Fixes projectcontour#2387 Updates projectcontour#403 Further documentation to come under projectcontour#403. Signed-off-by: Nick Young <ynick@vmware.com>
Adds the `--ingress-status-address` flag to specify what address should be added to Ingress `status.loadbalancer` stanza by Contour. Setting this flag will disable the automatic Envoy service watching for those details. Fixes projectcontour#2387 Updates projectcontour#403 Further documentation to come under projectcontour#403. Signed-off-by: Nick Young <ynick@vmware.com>
Adds the `--ingress-status-address` flag to specify what address should be added to Ingress `status.loadbalancer` stanza by Contour. Setting this flag will disable the automatic Envoy service watching for those details. Fixes projectcontour#2387 Updates projectcontour#403 Further documentation to come under projectcontour#403. Signed-off-by: Nick Young <ynick@vmware.com>
Adds the `--ingress-status-address` flag to specify what address should be added to Ingress `status.loadbalancer` stanza by Contour. Setting this flag will disable the automatic Envoy service watching for those details. Fixes projectcontour#2387 Updates projectcontour#403 Further documentation to come under projectcontour#403. Signed-off-by: Nick Young <ynick@vmware.com>
Adds the `--ingress-status-address` flag to specify what address should be added to Ingress `status.loadbalancer` stanza by Contour. Setting this flag will disable the automatic Envoy service watching for those details. Fixes projectcontour#2387 Updates projectcontour#403 Further documentation to come under projectcontour#403. Signed-off-by: Nick Young <ynick@vmware.com>
…ly (#2421) Adds the `--ingress-status-address` flag to specify what address should be added to Ingress `status.loadbalancer` stanza by Contour. Setting this flag will disable the automatic Envoy service watching for those details. Fixes #2387 Updates #403 Further documentation to come under #403. Signed-off-by: Nick Young <ynick@vmware.com>
Fixes projectcontour#403. Updates the `--ingress-status-address`, `--envoy-service-name`, and `--envoy-service-namespace` flags to be also readable from the config file. The `serveContext` fields needed to be exported in order for the export to work. Updated some logging to ensure that you can tell easily which settings are in effect. Signed-off-by: Nick Young <ynick@vmware.com>
Fixes projectcontour#403. Updates the `--ingress-status-address`, `--envoy-service-name`, and `--envoy-service-namespace` flags to be also readable from the config file. The `serveContext` fields needed to be exported in order for the export to work. Updated some logging to ensure that you can tell easily which settings are in effect. Signed-off-by: Nick Young <ynick@vmware.com>
Fixes projectcontour#403. Updates the `--ingress-status-address`, `--envoy-service-name`, and `--envoy-service-namespace` flags to be also readable from the config file. The `serveContext` fields needed to be exported in order for the export to work. Updated some logging to ensure that you can tell easily which settings are in effect. Signed-off-by: Nick Young <ynick@vmware.com>
Fixes projectcontour#403. Updates the `--ingress-status-address`, `--envoy-service-name`, and `--envoy-service-namespace` flags to be also readable from the config file. The `serveContext` fields needed to be exported in order for the export to work. Updated some logging to ensure that you can tell easily which settings are in effect. Signed-off-by: Nick Young <ynick@vmware.com>
Fixes projectcontour#403. Updates the `--ingress-status-address`, `--envoy-service-name`, and `--envoy-service-namespace` flags to be also readable from the config file. The `serveContext` fields needed to be exported in order for the export to work. Updated some logging to ensure that you can tell easily which settings are in effect. Signed-off-by: Nick Young <ynick@vmware.com>
Fixes projectcontour#403. Updates the `--ingress-status-address`, `--envoy-service-name`, and `--envoy-service-namespace` flags to be also readable from the config file. The `serveContext` fields needed to be exported in order for the export to work. Updated some logging to ensure that you can tell easily which settings are in effect. Signed-off-by: Nick Young <ynick@vmware.com>
Fixes #403. Updates the `--ingress-status-address`, `--envoy-service-name`, and `--envoy-service-namespace` flags to be also readable from the config file. The `serveContext` fields needed to be exported in order for the export to work. Updated some logging to ensure that you can tell easily which settings are in effect. Signed-off-by: Nick Young <ynick@vmware.com>
- Due to upstream issue in contour projectcontour/contour#403 address field was not setting on ingress resource. We introduced a workaround in 71c19e0. - Previously we were explicily using `IngressHosts` to work with external-dns. Now since the upstream issue has been fixed in contour we have removed option field `IngressHosts`. Signed-off-by: knrt10 <kautilya@kinvolk.io>
- Due to upstream issue in contour projectcontour/contour#403 address field was not setting on ingress resource. We introduced a workaround in 71c19e0. - Previously we were explicily using `IngressHosts` to work with external-dns. Now since the upstream issue has been fixed in contour we have removed option field `IngressHosts`. Signed-off-by: knrt10 <kautilya@kinvolk.io>
- Due to upstream issue in contour projectcontour/contour#403 address field was not setting on ingress resource. We introduced a workaround in 71c19e0. - Previously we were explicily using `IngressHosts` to work with external-dns. Now since the upstream issue has been fixed in contour we have removed option field `IngressHosts`. Signed-off-by: knrt10 <kautilya@kinvolk.io>
Due to upstream issue in contour, address fiels was not setting on ingress resource. We introduces a workaround to solve that issue. Previously we were explicitly using `IngressHosts` to work with external-dns. Now since the upstream issue has been fixed in contour we have removed optional field `IngressHosts`. See projectcontour/contour#403 and 71c19e0 Signed-off-by: knrt10 <kautilya@kinvolk.io>
Due to upstream issue in contour, address fiedls were not setting on ingress resource. We introduced a workaround to solve that issue. Previously we were explicitly using `IngressHosts` to work with external-dns. Now since the upstream issue has been fixed in contour we have removed optional field `IngressHosts`. See projectcontour/contour#403 and 71c19e0 Signed-off-by: knrt10 <kautilya@kinvolk.io>
Due to upstream issue in contour, address fields were not setting on ingress resource. We introduced a workaround to solve that issue. Previously we were explicitly using `IngressHosts` to work with external-dns. Now since the upstream issue has been fixed in contour we have removed optional field `IngressHosts`. See projectcontour/contour#403 and 71c19e0 Signed-off-by: knrt10 <kautilya@kinvolk.io>
Due to upstream issue in contour, address fields were not setting on ingress resource. We introduced a workaround to solve that issue. Previously we were explicitly using `IngressHosts` to work with external-dns. Now since the upstream issue has been fixed in contour we have removed optional field `IngressHosts`. Update ingress mainfest for Dex and Gangway. Added a new annotation `external-dns.alpha.kubernetes.io/hostname`, for external-dns to automatically create DNS entries external-dns default source changed to ingress See projectcontour/contour#403 and 71c19e0 Signed-off-by: knrt10 <kautilya@kinvolk.io>
Due to upstream issue in contour, address fields were not setting on ingress resource. We introduced a workaround to solve that issue. Previously we were explicitly using `IngressHosts` to work with external-dns. Now since the upstream issue has been fixed in contour we have removed optional field `IngressHosts`. See projectcontour/contour#403 and 71c19e0 Signed-off-by: knrt10 <kautilya@kinvolk.io>
Due to upstream issue in contour, address fields were not setting on ingress resource. We introduced a workaround to solve that issue. Previously we were explicitly using `IngressHosts` to work with external-dns. Now since the upstream issue has been fixed in contour we have removed optional field `IngressHosts`. See projectcontour/contour#403 and 71c19e0 Signed-off-by: knrt10 <kautilya@kinvolk.io>
Due to upstream issue in contour, address fields were not setting on ingress resource. We introduced a workaround to solve that issue. Previously we were explicitly using `IngressHosts` to work with external-dns. Now since the upstream issue has been fixed in contour we have removed optional field `IngressHosts`. See projectcontour/contour#403 and 71c19e0 Signed-off-by: knrt10 <kautilya@kinvolk.io>
Due to upstream issue in contour, address fields were not setting on ingress resource. We introduced a workaround to solve that issue. Previously we were explicitly using `IngressHosts` to work with external-dns. Now since the upstream issue has been fixed in contour we have removed optional field `IngressHosts`. See projectcontour/contour#403 and 71c19e0 Signed-off-by: knrt10 <kautilya@kinvolk.io>
Due to upstream issue in contour, address fields were not setting on ingress resource. We introduced a workaround to solve that issue. Previously we were explicitly using `IngressHosts` to work with external-dns. Now since the upstream issue has been fixed in contour we have removed optional field `IngressHosts`. See projectcontour/contour#403 and 71c19e0 Signed-off-by: knrt10 <kautilya@kinvolk.io>
Due to upstream issue in contour, address fields were not setting on ingress resource. We introduced a workaround to solve that issue. Previously we were explicitly using `IngressHosts` to work with external-dns. Now since the upstream issue has been fixed in contour we have removed optional field `IngressHosts`. See projectcontour/contour#403 and 71c19e0 Signed-off-by: knrt10 <kautilya@kinvolk.io>
Contour does not set the IP value on the Ingress resource. This value is necessary for services like ExternalDNS to work properly.
Version
The version that
https://j.hept.io/contour-deployment-norbac
produces. Atm:docker.io/envoyproxy/envoy-alpine:v1.6.0
gcr.io/heptio-images/contour:master (pointing to
b9ede01f025
)Repro
kubectl apply -f kubectl apply -f https://j.hept.io/contour-deployment-norbac
kubectl apply -f https://gist.githubusercontent.com/nphmuller/1c980c72e2119b1482e19eb619def08f/raw/10331f4bbc18abe36a0c8c841bf70ab04a38eb92/service-with-ingress.yaml
kubectl get ingress nginx
kubectl get ingress nginx -o yaml
Expected
A. ADDRESS column should have external IP of Contour load balancer service, but is empty.
B. status should have value:
but has value:
The text was updated successfully, but these errors were encountered: