Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

GEP-2627 DNS Policy #2712

Open
wants to merge 7 commits into
base: main
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Prev Previous commit
Next Next commit
changes post review
  • Loading branch information
maleck13 committed Mar 8, 2024
commit f3c86ee944363dfb802341cfe4ab3b2090114c9f
21 changes: 9 additions & 12 deletions geps/gep-2627/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,9 +8,10 @@
For gateway infrastructure to be valuable we need to be able to connect clients to these gateways. A common way to achieve this is to use domain names/hostnames and DNS. Gateways define listeners that can have assigned hostnames or wildcards. The guidelines for DNS configuration are a critical piece of service networking, but this is currently not expressible as part of Gateway API. Instead of leaving this as an exercise for the user to figure out, this proposal attempts to provide options to ease Gateway API operations.

## Goals
* Allow cluster operators or infrastructure providers to declaratively express which DNS service they want to use with a particular Gateway or Gateway Listener and have that DNS service interacted with via a controller to provision and configure the defined listener hostnames as DNS names and records based on the addresses assigned to the gateway instances.
* Provide a standard CRD-based API as an alternative to the need for "loose" APIs such as annotations. Support an easily extended, standardized, versioned, and status-reporting API.
* Increase portability and supportability across gateway providers and third party implementors, for this type of key configuration
* Allow cluster operators to declaratively express which DNS service they want to use with a particular Gateway or Gateway Listener.
* Provide a mechanism to allow the DNS configuration to be delegated to a chosen controller.
* Provide a standard CRD-based API as an alternative to the need for "loose" APIs such as annotations. Support an easily extended, standardized, versioned, and status-reporting API.
* Increase portability and supportability between Gateway API implementations and third party controllers offering DNS integration.

## Non-Goals

Expand All @@ -20,7 +21,9 @@ For gateway infrastructure to be valuable we need to be able to connect clients

As a cluster administrator, I manage a set of domains and a set of gateways. I would like to declaratively define which DNS provider to use to configure connectivity for clients accessing these domains and my gateway so that I can see and configure which DNS provider is being used and limit which domains can be used.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I recommend separating these concerns - we don't need to discuss managing a set of domains, which may be handled by another party. Limiting the domains could be a different use case than configuring a DNS provider.


A a cluster administrator, I would like to have the dns names automatically populated into my specified dns zones as a set of records based on the assigned addresses of my gateways and have the status of the DNS records reported back to me, so that I do not have to undertake external automation or management of this essential task and can leverage existing kube based monitoring tools to know the status of the integration.
As a cluster administrator, I would like to have the DNS names automatically populated into my specified DNS zones as a set of records based on the assigned addresses of my gateways so that I do not have to undertake external automation or management of this essential task.

As a cluster administrator I would have the status of the DNS records reported back to me, so that I can leverage existing kube based monitoring tools to know the status of the integration.

As a cluster administrator, I would like the DNS records to be setup automatically based on the assigned gateways address and if the IP or hostname changes, I would like for the DNS to update automatically to ensure traffic continues to reach my gateway.
maleck13 marked this conversation as resolved.
Show resolved Hide resolved

maleck13 marked this conversation as resolved.
Show resolved Hide resolved
Expand All @@ -33,18 +36,12 @@ Initial draft will not offer an API yet until the use cases are agreed. Some tho

## Conformance Details

(This section describes the names to be used for the feature or
features in conformance tests and profiles.

These should be `CamelCase` names that specify the feature as
precisely as possible, and are particularly important for
Extended features, since they may be surfaced to users.)
TBD

## Alternatives

it is possible to use `external-dns` to manage dns based on HTTPRoutes and Gateways https://github.com/kubernetes-sigs/external-dns/blob/7f3c10d65297ec1c4bcc8dd6f88c189b7f3e80d0/docs/tutorials/gateway-api.md. The aim of this GEP is not remove this as an option, but instead provide a common API that could then be leveraged by something like external-dns.

## References

(Add any additional document links. Again, we should try to avoid
too much content not in version control to avoid broken links)
TBD
2 changes: 1 addition & 1 deletion geps/gep-2627/metadata.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@ apiVersion: internal.gateway.networking.k8s.io/v1alpha1
kind: GEPDetails
number: 2627
name: DNS configuration for Gateway API
status: Experimental
status: Provisional
authors:
- maleck13