-
Notifications
You must be signed in to change notification settings - Fork 616
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[OCCM] Set Hostname in load balancer status when using PROXY protocol #1449
[OCCM] Set Hostname in load balancer status when using PROXY protocol #1449
Conversation
Build succeeded.
|
Build succeeded.
|
Build failed.
|
Build succeeded.
|
Build succeeded.
|
Build succeeded.
|
Build failed.
|
Build failed.
|
Build failed.
|
/test cloud-provider-openstack-acceptance-test-lb-octavia |
@lingxiankong: The specified target(s) for
Use In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/test cloud-provider-openstack-acceptance-test-e2e-conformance-stable-branch-v1.19 |
@lingxiankong: The specified target(s) for
Use In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/test cloud-provider-openstack-acceptance-test-e2e-conformance-stable-branch-v1.18 |
@lingxiankong: The specified target(s) for
Use In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Build failed.
|
Build succeeded.
|
Build succeeded.
|
Build succeeded.
|
Build succeeded.
|
Build failed.
|
/test cloud-provider-openstack-acceptance-test-lb-octavia |
@lingxiankong: The specified target(s) for
Use In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
@lingxiankong: The specified target(s) for
Use In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Build succeeded.
|
Build failed.
|
/test cloud-provider-openstack-acceptance-test-e2e-conformance-stable-branch-v1.19 |
@lingxiankong: The specified target(s) for
Use In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Build failed.
|
/test cloud-provider-openstack-acceptance-test-e2e-conformance-stable-branch-v1.19 |
@lingxiankong: The specified target(s) for
Use In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Build succeeded.
|
Build succeeded.
|
Thanks. changes looks ok to me . |
/approve |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: jichenjc The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Looks like this breaks external-dns, which sees that
|
Hi @multi-io, I'm not familiar with external-dns, but if using external-dns, I would assume the pod is using dns (rather than external IP) to access the service, so without enabling the config |
Hi @lingxiankong, external-dns just connects to some external DNS service like AWS Route53 or Openstack Designate and sets up DNS records for your ingress hostnames, pointing to the LB IP. The pod looks up those names and they resolve to the LB IP, which the pod then tries to connect to, which will fail without the new |
Thanks for the detailed clarification, I understand now. Yes, this workaround doesn't work properly with external-dns, to fully fix this issue, we have to wait for the k8s upstream solution. I will propose a PR to add something in the doc. |
What this PR does / why we need it:
Related issues in other repos:
In PROXY mode, set Hostname field using IP address and a suffix
.nip.io
to expose the Service of LoadBalancer type.A new config option
enable-ingress-hostname
is introduced but may be removed in the future, please see the document change.Which issue this PR fixes(if applicable):
fixes #1287
Special notes for reviewers:
Release note: