-
Notifications
You must be signed in to change notification settings - Fork 575
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Create network resources for AWS Local Zones and Wavelength Zones #4874
Comments
This issue is currently awaiting triage. If CAPA/CAPI contributors determines this is a relevant issue, they will accept it by applying the The Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
The flow for route discover and creation is reviewed to provide flexibility of route entry inputs for routes discovered by each subnet. This change is a subset of Wavelength zone (kubernetes-sigs#4874) feature which will introduce requirements when discovering gateways of public and private subnets. The refact should not change the existing flow.
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
The flow for route discover and creation is reviewed to provide flexibility of route entry inputs for routes discovered by each subnet. This change is a subset of Wavelength zone (kubernetes-sigs#4874) feature which will introduce requirements when discovering gateways of public and private subnets. The refact should not change the existing flow.
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close not-planned |
@k8s-triage-robot: Closing this issue, marking it as "Not Planned". In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
The flow for route discover and creation is reviewed to provide flexibility of route entry inputs for routes discovered by each subnet. This change is a subset of Wavelength zone (kubernetes-sigs#4874) feature which will introduce requirements when discovering gateways of public and private subnets. The refact should not change the existing flow.
/kind feature
Describe the solution you'd like:
Support of creation network infrastructure, subnets, and gateways, required for AWS
Local Zones and Wavelength zones, allowing users to create compute nodes (non-control
plane) specifying those subnets.
AWS Local Zones allow end-users to deploy cloud resources closer to the metropolitan
regions and offer a limited resource, like Instance Type, Block Storage, Application Load
Balancers, Nat Gateways etc.
The network infrastructure required to create nodes in Local Zones are:
is not API to query if it is offered in the zone.
AWS Wavelength zones are infrastructure running in carrier infrastructure. It also have
limitations of resources offered in those locations.
Network resources required for Wavelength zones:
Not Goal:
Anything else you would like to add:
[Miscellaneous information that will assist in solving the issue.]
Currently, OpenShift creates the network resources required to deploy only compute
nodes in AWS Local Zones and Wavelength zones, and we would like to use Cluster API to
deploy those resources. Machines (compute nodes) are then
created, outside Cluster API.
Considering the limitation of network-based load balancers, we used to recommend
to the users to use the AWS Application Load Balancer controller to
create ingress traffic into those zones (day-2).
For the gateway for private subnets, we are reusing the same Nat Gateway for the
Parent Zone (zone attribute), when it exists, otherwise, the
"default" private route table will be used to associate the zone in the remote location.
If possible, it would be nice to deploy Nat Gateway in the location, when supported
(currently, only a few Local Zone locations support it), otherwise, use some strategy like that.
For the gateway for public subnets in Wavelength Zones, we are creating a single
"public carrier" route table, with the default route entry to the Carrier Gateway,
previously created and associated with the VPC,
For more details feel free to read the enhancement with more details here.
The suggested Local Zones workflow looks like this:
create the cluster, including Local Zone or Wavelength Zones, in the existing API
field
SubnetSpec.AvailabilityZone
- keeping the valid placeholderID
toteach Cluster API to create subnets.
then discovers the zone attributes* for the subnet's zone
to the regular flow, preventing issues in the controllers consuming the standard flow
appropriate route and gateway for public subnets in Carrier Gateways
appropriate gateway for private subnets
*Required API changes for the proposed workflow:
SubnetSpec
:The suggested Wavelength Zones workflow looks like this:
create the cluster, including Local Zone or Wavelength Zones, in the existing API
field
SubnetSpec.AvailabilityZone
- keeping the valid placeholderID
toteach Cluster API to create subnets.
then discovers the zone attributes* for the subnet's zone
to the regular flow, preventing issues in the controllers consuming the standard flow
appropriate gateway for private subnets
*Required API changes for the proposed workflow:
VPCSpec
:Tasks
The text was updated successfully, but these errors were encountered: