Skip to content

[WIP] In-memory Channels without Istio sidecar#524

Closed
adamharwayne wants to merge 31 commits into
knative:masterfrom
Harwayne:public-channels
Closed

[WIP] In-memory Channels without Istio sidecar#524
adamharwayne wants to merge 31 commits into
knative:masterfrom
Harwayne:public-channels

Conversation

@adamharwayne
Copy link
Copy Markdown
Contributor

@adamharwayne adamharwayne commented Oct 15, 2018

Proposed Changes

  • Expose in-memory channels by letting them be reached through the exposed Knative Ingress Gateway.
  • in-memory Channels can be used by pods without an Istio sidecar.

Release Note

in-memory Channels are exposed via a cluster-wide Ingress Gateway.

@knative-prow-robot knative-prow-robot added the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label Oct 15, 2018
@knative-prow-robot knative-prow-robot added size/M Denotes a PR that changes 30-99 lines, ignoring generated files. and removed size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files. labels Oct 18, 2018
@googlebot googlebot added the cla: yes Indicates the PR's author has signed the CLA. label Oct 18, 2018
@vaikas
Copy link
Copy Markdown
Contributor

vaikas commented Oct 18, 2018

/lgtm

leaving for @scothis to approve since he had questions.

@knative-prow-robot knative-prow-robot added the lgtm Indicates that a PR is ready to be merged. label Oct 18, 2018
@knative-prow-robot
Copy link
Copy Markdown
Contributor

New changes are detected. LGTM label has been removed.

@knative-prow-robot knative-prow-robot removed the lgtm Indicates that a PR is ready to be merged. label Oct 18, 2018
@knative-prow-robot
Copy link
Copy Markdown
Contributor

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: adamharwayne
To fully approve this pull request, please assign additional approvers.
We suggest the following additional approver: vaikas-google

If they are not already assigned, you can assign the PR to them by writing /assign @vaikas-google in a comment when ready.

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@scothis
Copy link
Copy Markdown
Contributor

scothis commented Oct 18, 2018

Can we setup a new, internal Gateway before this is merged rather than using serving's public gateway? Besides the security benefits, I'm not sure it's worth introducing a hard dependency on serving's runtime.

@n3wscott
Copy link
Copy Markdown
Contributor

It's generally not a good thing for channels to be exposed via Ingress. Do you have thoughts on how to prevent external access to channels with this model?

This is true and we have the thought that it is a future problem that is easy to solve later.

@knative-prow-robot knative-prow-robot added size/L Denotes a PR that changes 100-499 lines, ignoring generated files. and removed size/M Denotes a PR that changes 30-99 lines, ignoring generated files. labels Oct 23, 2018
@adamharwayne
Copy link
Copy Markdown
Contributor Author

/cc @tcnghia
Thanks @tcnghia for help understanding Istio.

I've tested this and it seems to work correctly, but I am hesitant to copy the entirety of 202-gateway.yaml, which this currently does. Unless people really want this soon, I'll let this sit in WIP until I find a better solution or find there isn't one.

@bbrowning
Copy link
Copy Markdown
Contributor

Coming back to this - we now have a cluster-local gateway that would allow us to expose in-memory channels to the cluster without also exposing them to the internet. So perhaps worth an update and getting this in?

@Harwayne
Copy link
Copy Markdown
Contributor

Coming back to this - we now have a cluster-local gateway that would allow us to expose in-memory channels to the cluster without also exposing them to the internet. So perhaps worth an update and getting this in?

I talked with @tcnghia about how Serving is doing, and it sounds like Istio is (or soon will be) optional over there. Right now Eventing depends on the VirtualService routing properties of Istio and I haven't investigated to find out if other solutions have the same capability.

This PR is about being able to use Istio lean, which should be easily doable if we have a cluster-local Gateway. Which one can we use?

@evankanderson
Copy link
Copy Markdown
Member

The current cluster-local rules in Serving rely on the mesh mode to provide the service only within "the cluster" (actually, within the mesh).

@tcnghia
Copy link
Copy Markdown

tcnghia commented Mar 15, 2019

@evankanderson @adamharwayne we offer a setting in config-istio to configure what we will use for local gateway. The default when nothing is specified is mesh, but user could point to something like this one that we also include in istio.yaml and istio-lean.yaml https://github.com/knative/serving/blob/master/third_party/istio-1.0.6/download-istio.sh#L13

@matzew
Copy link
Copy Markdown
Member

matzew commented Apr 25, 2019

@Harwayne I think this is obsolete w/ the other istio removal work ?

@Harwayne
Copy link
Copy Markdown
Contributor

This is no longer needed. #1044 removed the Istio requirements for in-memory Channels.

@Harwayne
Copy link
Copy Markdown
Contributor

/close

@knative-prow-robot
Copy link
Copy Markdown
Contributor

@Harwayne: Closed this PR.

Details

In response to this:

/close

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

cla: yes Indicates the PR's author has signed the CLA. do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. size/L Denotes a PR that changes 100-499 lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.