-
Notifications
You must be signed in to change notification settings - Fork 480
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Make the maximum number of listeners in Gateway CRD configurable #2869
Comments
There is a lot of discussion around similar topics in #1863. IMO, I strongly agree with the need to have >64. But a few notes
cc @robscott |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
Hi @bravenut, I don't really understand how you're doing this, since a Gateway is not a valid The intended design here is for the Gateway to hold summarized Listeners (most likely bounded by a wildcard certificate or something, so you could have two listeners, one for We'd need some example config of what you want to do here to understand your request better. Remember that Listeners are only required to be distinct on the following fields:
|
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close not-planned |
@k8s-triage-robot: Closing this issue, marking it as "Not Planned". In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
/reopen |
@kghost: You can't reopen an issue/PR unless you authored it or you are a collaborator. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
Sometimes, they can not be summarized, for example, to build a CDN, we probably need hundreds of thousands listeners, with different TLDs. |
I think that this use case is probably better addressed with something like #3213 - although I still think that having hundreds of thousands of listeners on a single Gateway is way outside what our current scaling design takes into account, so it's likely that there will be scale problems we haven't considered. Also, if you're terminating TLS or otherwise wanting to do inspection on the HTTP metadata at the Gateway implementation point, then using More generally, it's generally going to be way more scalable to attach lots of HTTPRoutes to a Gateway than it is to have lots of Listeners (if you can easily summarize the listeners on the same port or something). |
What would you like to be added:
I would like the gateway CRD template to be improved by making the
maxItems
on the gateway listeners to be configurable instead of it being hard coded to be 64 items (see experimental gateway CRD).Why this is needed:
Our current setup uses an "edge" gateway (Kubernetes Gateway API gateway) routing requests to other "inner" gateways based on the path prefix. We currently have around 30 inner gateways which the edge gateway routes requests to, but we will have more in the future, so we will hit the hard coded limit of 64 max really soon.
The text was updated successfully, but these errors were encountered: