Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support AWS Network Load Balancer #423

Closed
tamalsaha opened this issue Sep 8, 2017 · 89 comments
Closed

Support AWS Network Load Balancer #423

tamalsaha opened this issue Sep 8, 2017 · 89 comments
Assignees
Labels
area/provider/aws Issues or PRs related to aws provider kind/feature Categorizes issue or PR as related to a new feature. lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed. sig/cloud-provider Categorizes an issue or PR as relevant to SIG Cloud Provider. stage/beta Denotes an issue tracking an enhancement targeted for Beta status tracked/no Denotes an enhancement issue is NOT actively being tracked by the Release Team

Comments

@tamalsaha
Copy link
Member

tamalsaha commented Sep 8, 2017

Can Kubernetes support the new AWS NLB for LoadBalancer type Service? https://aws.amazon.com/elasticloadbalancing/details/ . I am assuming that users can apply some annotation on the Service that will tell aws cloud provider to use NLB instead of classic ELB to expose Kubernetes service.

Feature Description

@cmluciano
Copy link

@kubernetes/sig-aws-misc

@k8s-ci-robot k8s-ci-robot added the area/provider/aws Issues or PRs related to aws provider label Sep 11, 2017
@jrideout
Copy link

@idvoretskyi
Copy link
Member

@tamalsaha

Design proposal link (community repo):

Is the design proposal publicly available?

@idvoretskyi idvoretskyi added this to the 1.9 milestone Oct 2, 2017
@idvoretskyi idvoretskyi added the stage/alpha Denotes an issue tracking an enhancement targeted for Alpha status label Oct 2, 2017
@tamalsaha
Copy link
Member Author

@idvoretskyi , I don't have a design proposal.

@idvoretskyi
Copy link
Member

@tamalsaha it is required.

cc @kubernetes/sig-aws-misc

@erickt
Copy link

erickt commented Nov 1, 2017

FYI, @micahhausler has a PR to implement support NLBs as a service load balancer: kubernetes/kubernetes#53400

@micahhausler
Copy link
Member

In addition to the cloudprovider portion to create the NLB/security rules, there will need to be additional work on the kube-proxy to correctly get the packet to the individual pod with the remote IP intact.

Also, there is an issue tracking NLB support on kubernetes/kubernetes#52173

@justinsb
Copy link
Member

justinsb commented Nov 2, 2017

Great progress - thanks @micahhausler! For IP preservation, AIUI NLB doesn't support proxy protocol, which was the go-to trick previously.

The good news is that this is much more similar to GCE's load balancer, as I understand it. So we should be able to apply the same approach as is used on GCE. @thockin any pointers for us?

@micahhausler
Copy link
Member

Two additional features that could be later added for NLB are:

  • Supporting the Elastic IP addresses for NLB
  • Supporting advanced health checks for NLB

@caseydavenport caseydavenport added the sig/network Categorizes an issue or PR as relevant to SIG Network. label Nov 2, 2017
@Mikulas
Copy link

Mikulas commented Nov 3, 2017

For IP preservation, AIUI NLB doesn't support proxy protocol, which was the go-to trick previously.

It seems NLB does not always pass the original address though:

You can configure a target group so that you register targets by instance ID or IP address. If you specify targets using an instance ID, the source IP addresses of the clients are preserved and provided to your applications. If you specify targets by IP address, the source IP addresses are the private IP addresses of the load balancer nodes.
http://docs.aws.amazon.com/elasticloadbalancing/latest/network/elb-ng.pdf page 6

Will NLB support in k8s be limited to instances that can be registered by instance ID? Those seem to be types that support IPv6, explicitly excluding m3

You cannot register instances by instance ID if they have the following instance types: C1, CC1, CC2, CG1, CG2, CR1, G1, G2, HI1, HS1, M1, M2, M3, and T1. You can register instances of these types by IP address.
http://docs.aws.amazon.com/elasticloadbalancing/latest/network/elb-ng.pdf page 25

@micahhausler
Copy link
Member

I'll be giving a demo of what I've currently got working with NLB at the sig-aws meeting later today, I'll write up more after the meeting.

@aledbf
Copy link
Member

aledbf commented Nov 3, 2017

@micahhausler it will be recorded?

@micahhausler
Copy link
Member

Yes, they do record them, but I don't know where links to recordings are. @justinsb probably knows.

@idvoretskyi
Copy link
Member

@justinsb @kubernetes/sig-aws-misc can you please add the design proposal link to the feature description?

@zacharysarah
Copy link
Contributor

@tamalsaha 👋 Please indicate in the 1.9 feature tracking board
whether this feature needs documentation. If yes, please open a PR and add a link to the tracking spreadsheet. Thanks in advance!

@micahhausler
Copy link
Member

Already have a doc PR ready for merge kubernetes/website#6260

@fejta-bot
Copy link

Issues go stale after 90d of inactivity.
Mark the issue as fresh with /remove-lifecycle stale.
Stale issues rot after an additional 30d of inactivity and eventually close.

If this issue is safe to close now please do so with /close.

Send feedback to sig-testing, kubernetes/test-infra and/or fejta.
/lifecycle stale

@k8s-ci-robot k8s-ci-robot added the lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. label Feb 20, 2018
@lalomartins
Copy link

I'm new here, but I don't think this is stale. Implementation is in progress, in alpha cycle, I'm using it, and it mostly works. Maybe issues with a stage/* label should be immune to stale?

@fejta-bot
Copy link

Stale issues rot after 30d of inactivity.
Mark the issue as fresh with /remove-lifecycle rotten.
Rotten issues close after an additional 30d of inactivity.

If this issue is safe to close now please do so with /close.

Send feedback to sig-testing, kubernetes/test-infra and/or fejta.
/lifecycle rotten
/remove-lifecycle stale

@k8s-ci-robot k8s-ci-robot added lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed. and removed lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. labels Mar 22, 2018
@micahhausler
Copy link
Member

/remove-lifecycle rotten

@msedzins
Copy link

Hey @justinsb , Enhancement shadow for the v1.19 release cycle here. Just following up on my earlier update to inform you of the
upcoming Enhancement Freeze scheduled on Tuesday, May 19.

Regards,
Mirek

@palnabarun
Copy link
Member

@justinsb -- Unfortunately the deadline for the 1.19 Enhancement freeze has passed. For now, this is being removed from the milestone and 1.19 tracking sheet. If there is a need to get this in, please file an enhancement exception.

@fejta-bot
Copy link

Issues go stale after 90d of inactivity.
Mark the issue as fresh with /remove-lifecycle stale.
Stale issues rot after an additional 30d of inactivity and eventually close.

If this issue is safe to close now please do so with /close.

Send feedback to sig-testing, kubernetes/test-infra and/or fejta.
/lifecycle stale

@k8s-ci-robot k8s-ci-robot added the lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. label Aug 18, 2020
@frittentheke
Copy link

/remove-lifecycle stale

@k8s-ci-robot k8s-ci-robot removed the lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. label Aug 18, 2020
@olemarkus
Copy link
Member

What is missing to bring to this to GA?

@kikisdeliveryservice
Copy link
Member

Hi @justinsb

Enhancements Lead here. Any plans for this to graduate in 1.20?

Thanks,
Kirsten

@kikisdeliveryservice
Copy link
Member

Hi @M00nF1sh @justinsb @micahhausler ,

Any updates on this, as a reminder Enhancements Freeze is October 6th and we expect that:

  • The KEP must be merged in an implementable state
  • The KEP must have test plans
  • The KEP must have graduation criteria.

Also the link to your KEP in the description seems to 404?

Thanks
Kirsten

@nckturner
Copy link
Contributor

Since the legacy-cloud-provider won't be merging feature PRs after 1.20, and it looks like the original KEP has been deleted, it sounds like this PR should be closed and we should be tracking cloud provider specific enhancements elsewhere?

For the out-of-tree NLB integration, we will be eventually moving it to the aws-load-balancer-controller, so if we keep this KEP we should update it to reflect that change.

@fejta-bot
Copy link

Issues go stale after 90d of inactivity.
Mark the issue as fresh with /remove-lifecycle stale.
Stale issues rot after an additional 30d of inactivity and eventually close.

If this issue is safe to close now please do so with /close.

Send feedback to sig-contributor-experience at kubernetes/community.
/lifecycle stale

@k8s-ci-robot k8s-ci-robot added the lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. label Feb 10, 2021
@frittentheke
Copy link

/remove-lifecycle stale

@k8s-ci-robot k8s-ci-robot removed the lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. label Feb 12, 2021
@ehashman
Copy link
Member

ehashman commented May 4, 2021

Since the legacy-cloud-provider won't be merging feature PRs after 1.20, and it looks like the original KEP has been deleted,

It's here: https://github.com/kubernetes/enhancements/tree/master/keps/provider-aws/423-network-load-balancer

@thockin
Copy link
Member

thockin commented May 22, 2021

Is there any reason this should not be closed ?

@thockin thockin added sig/cloud-provider Categorizes an issue or PR as relevant to SIG Cloud Provider. and removed sig/network Categorizes an issue or PR as relevant to SIG Network. labels May 22, 2021
@nckturner
Copy link
Contributor

nckturner commented May 22, 2021 via email

@k8s-triage-robot
Copy link

The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs.

This bot triages issues and PRs according to the following rules:

  • After 90d of inactivity, lifecycle/stale is applied
  • After 30d of inactivity since lifecycle/stale was applied, lifecycle/rotten is applied
  • After 30d of inactivity since lifecycle/rotten was applied, the issue is closed

You can:

  • Mark this issue or PR as fresh with /remove-lifecycle stale
  • Mark this issue or PR as rotten with /lifecycle rotten
  • Close this issue or PR with /close
  • Offer to help out with Issue Triage

Please send feedback to sig-contributor-experience at kubernetes/community.

/lifecycle stale

@k8s-ci-robot k8s-ci-robot added the lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. label Aug 20, 2021
@k8s-triage-robot
Copy link

The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs.

This bot triages issues and PRs according to the following rules:

  • After 90d of inactivity, lifecycle/stale is applied
  • After 30d of inactivity since lifecycle/stale was applied, lifecycle/rotten is applied
  • After 30d of inactivity since lifecycle/rotten was applied, the issue is closed

You can:

  • Mark this issue or PR as fresh with /remove-lifecycle rotten
  • Close this issue or PR with /close
  • Offer to help out with Issue Triage

Please send feedback to sig-contributor-experience at kubernetes/community.

/lifecycle rotten

@k8s-ci-robot k8s-ci-robot added lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed. and removed lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. labels Sep 19, 2021
@k8s-triage-robot
Copy link

The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs.

This bot triages issues and PRs according to the following rules:

  • After 90d of inactivity, lifecycle/stale is applied
  • After 30d of inactivity since lifecycle/stale was applied, lifecycle/rotten is applied
  • After 30d of inactivity since lifecycle/rotten was applied, the issue is closed

You can:

  • Reopen this issue or PR with /reopen
  • Mark this issue or PR as fresh with /remove-lifecycle rotten
  • Offer to help out with Issue Triage

Please send feedback to sig-contributor-experience at kubernetes/community.

/close

@k8s-ci-robot
Copy link
Contributor

@k8s-triage-robot: Closing this issue.

In response to this:

The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs.

This bot triages issues and PRs according to the following rules:

  • After 90d of inactivity, lifecycle/stale is applied
  • After 30d of inactivity since lifecycle/stale was applied, lifecycle/rotten is applied
  • After 30d of inactivity since lifecycle/rotten was applied, the issue is closed

You can:

  • Reopen this issue or PR with /reopen
  • Mark this issue or PR as fresh with /remove-lifecycle rotten
  • Offer to help out with Issue Triage

Please send feedback to sig-contributor-experience at kubernetes/community.

/close

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/provider/aws Issues or PRs related to aws provider kind/feature Categorizes issue or PR as related to a new feature. lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed. sig/cloud-provider Categorizes an issue or PR as relevant to SIG Cloud Provider. stage/beta Denotes an issue tracking an enhancement targeted for Beta status tracked/no Denotes an enhancement issue is NOT actively being tracked by the Release Team
Projects
None yet
Development

No branches or pull requests