-
Notifications
You must be signed in to change notification settings - Fork 11
-
Notifications
You must be signed in to change notification settings - Fork 11
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
GKE: Using pod dns names (service scoped) doesn't work on GKE thus preventing ControlPlane
-> DP's Admin API traffic
#179
Comments
|
The problem with this on GKE is that:
https://cloud.google.com/kubernetes-engine/docs/how-to/kube-dns#service-dns-records. Which would require us to not only use different methods of creating URLs, but also different Hence we'd need to use a |
Found a «workaround» in one of [SO answers](https://stackoverflow.com/questions/55122234/installing-coredns-on-gke.
This seems to work for me on GKE
|
Created an issue for kube-dns to request providing service scoped dns names: kubernetes/dns#633 |
Bumps [k8s.io/client-go](https://github.com/kubernetes/client-go) from 0.24.3 to 0.24.4. - [Release notes](https://github.com/kubernetes/client-go/releases) - [Changelog](https://github.com/kubernetes/client-go/blob/master/CHANGELOG.md) - [Commits](kubernetes/client-go@v0.24.3...v0.24.4) --- updated-dependencies: - dependency-name: k8s.io/client-go dependency-type: direct:production update-type: version-update:semver-patch ... Signed-off-by: dependabot[bot] <[email protected]> Signed-off-by: dependabot[bot] <[email protected]> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Current Behavior
Currently when
ControlPlane
creates Admin API address for a particular Gateway it uses Pods A record (ref: https://kubernetes.io/docs/concepts/services-networking/dns-pod-service/#a-aaaa-records-1) which works on kind (which uses coredns) but doesn't work on GKE (which uses kube-dns).Related piece of code:
gateway-operator/controllers/controlplane_controller_utils.go
Lines 166 to 169 in b1bda5c
This effectively make the
ControlPlane
->DataPlane
's Admin API traffic to not work on GKE.The following is a log from KIC using GD on GKE but the same happens when using operator with
ControlPlane
bound to aDataPlane
(e.g. via aGateway
object).This is important to think about this in the context of KIC and KGO collaboration because:
gateway-operator/controllers/controlplane_controller_utils.go
Lines 166 to 169 in b1bda5c
DataPlane
forfmt.Sprintf("*.%s.%s.svc", adminServiceName, dataplane.Namespace)
subjectRelated KIC issue: Kong/kubernetes-ingress-controller#4065
Expected Behavior
ControlPlane
<->DataPlane
traffic works on GKE.Operator Version
9a7d17a
The text was updated successfully, but these errors were encountered: