-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow Knative Services to not be exposed via Ingress #2127
Comments
Thanks for opening this issue. The same has been raised by many other users. We should prioritize this. |
Since we are currently using Istio Gateway pods to avoid requiring Istio sidecar for making request to Route's internal domain, we can just simply drop the Route's VirtualService from the Gateway. We probably will need to find another way to still expose the Route's internal domain for cluster local access without sidecar. |
) * Add new type ClusterIngress and some basic validation & defaults. * Fix doc of ClassAnnotationKey. * Add OWNERS file. * Update documentation to highlight relation to K8s Ingress. * Add duck.VerifyType checks. * Update PR feedback. * Address PR feedback. * Update based on PR feedback. * Update PR feedback. * Add TODO linking to #2127. * Update PR feedback. * Address PR feedback.
We get this ask a lot. Let's consider it for 0.3? |
/assign @lichuqiang |
/cc |
I mentioned this early in August. I would consider this a blocker. So big +1 |
…151) * Add new type ClusterIngress and some basic validation & defaults. * Fix doc of ClassAnnotationKey. * Add OWNERS file. * Update documentation to highlight relation to K8s Ingress. * Add duck.VerifyType checks. * Update PR feedback. * Address PR feedback. * Update based on PR feedback. * Update PR feedback. * Add TODO linking to knative/serving#2127. * Update PR feedback. * Address PR feedback.
…151) * Add new type ClusterIngress and some basic validation & defaults. * Fix doc of ClassAnnotationKey. * Add OWNERS file. * Update documentation to highlight relation to K8s Ingress. * Add duck.VerifyType checks. * Update PR feedback. * Address PR feedback. * Update based on PR feedback. * Update PR feedback. * Add TODO linking to knative/serving#2127. * Update PR feedback. * Address PR feedback.
Expected Behavior
It should be possible to create a Knative Service that is not exposed via Ingress. This could be an event driven function that is invoked internally and should never be exposed to the public.
The same surgical routing that the Route resource provides for canaries and blue/green deployments is still desired. The only expected difference is that traffic from outside the cluster should be rejected.
Actual Behavior
All Knative Services are exposed publicly via Ingress.
Additional Info
This is an issue I've considered opening in the past. An attendee at SpringOne asked if this was possible. Unfortunately, I don't have more specifics about the particular use case.
/cc @tcnghia
The text was updated successfully, but these errors were encountered: