Skip to content

Conversation

@shaneutt
Copy link
Member

First pass a #10, focusing on building consensus on the "What?" and "Why?" before worrying about how we're going to implement it, and which SIGs and sub-projects we will propose to (those will come in follow-up PRs).

@k8s-ci-robot k8s-ci-robot added the cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. label Oct 15, 2025
@k8s-ci-robot k8s-ci-robot added approved Indicates a PR has been approved by an approver from all required OWNERS files. size/M Denotes a PR that changes 30-99 lines, ignoring generated files. labels Oct 15, 2025
@shaneutt shaneutt linked an issue Oct 15, 2025 that may be closed by this pull request

# Relevant Links

* [Istio's implementation of Egress Gateways](https://istio.io/latest/docs/tasks/traffic-management/egress/egress-gateway/)

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We're working on getting this into istio's docs (ETA: Istio 1.28 this month), but the ambient egress gateway approach defined here works with open source: https://www.solo.io/blog/egress-gateways-made-easy

Copy link

@keithmattix keithmattix left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Just approving for now so others have time to review. Big +1 from me; I think this is the foundation use-case for this WG, and this doc covers the AI-oriented aspects of the "What" and "Why" very well

/approve

Comment on lines +19 to +22
services. All of this points to a need to provide standards for how Kubernetes
workloads reach these external inference sources, and provide the same AI
Gateway security, control and management capabilities that are required for the
ingress use case.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

These lines read as 2 related things, with a dependency between them.

  • standards for how Kubernetes workloads reach external inference services
  • using the same ai security capabilities with egress as you would with ingress (which would build on those standards)

Is there a standard for either of these things more generally in kubernetes for egress and egress security (non ai related)?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

There's a few things sprinkled all over the ecosystem, weird tricks with externalname services, technically serviceimport in MCS kind of has some play here, and then several implementations of egress gateways in CNIs and service meshes.

Copy link

@usize usize Oct 17, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@david-martin

Agree that it could be a reasonable approach to use existing solutions as a sort of de-facto standard to build on.

Taking at look at gateways from:

cilium and istio

Common features => static egress IP, routing policies, identity aware auth and mTLS for workload level security, rate limiting, application layer telemetry and workload attribution (super important for agents).

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

There's some NetworkPolicy egress capabilities too, but egress functionality in meshes is definitely more mature and comprehensive than anything that has made its way into core Kubernetes or spec CRDs thus far.

Signed-off-by: Shane Utt <shaneutt@linux.com>

* As a developer of an application that requires inference as part of its
function, I need fail-over to 3rd party providers if local AI workloads are
overwhelmed or in a failure state.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is the intent to scope the egress gateway only on inferencing, or should egress consider also user stories for agents invoking external tools or other agents as described in Agentic Networking for Kubernetes ?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This will need to provide:

  • General L7 support
  • AI Inference Support
  • AI Agentic Support

So yes it's a combination of many things that need this, and you'll see in the comment history of that doc that we agreed this is something where the sub-project and the WG will need to work together.

@shaneutt shaneutt requested a review from pdettori October 16, 2025 14:17
Gateway security, control and management capabilities that are required for the
ingress use case.

## User Stories
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I realize this doesn't need to be comprehensive, but calling back to @david-martin's question about typical egress stories I can think of some egress use cases which might also apply to AI workloads (but in a way that would benefit from protocol level understanding):

"As a platform operator I need to attribute outbound traffic per namespace or workload to enforce rate or API utilization limits."

"As a compliance engineer I need to guarantee that outbound traffic to third-party AI resources obeys regulatory restrictions such as region locks."

Comment on lines +26 to +28
* As a cluster admin I need to provide inference to workloads on my cluster,
but I provide a dedicated cluster for this so that I can manage it
separately.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This definitely overlaps the most with existing Gateway API Inference Extension scope, specifically kubernetes-sigs/gateway-api-inference-extension#1374 (worth reading linked design doc too for alternatives considered and potential future alternative approaches)

@nirrozenbaum
Copy link
Contributor

/approve

the main aspects of eagress gw are well covered and this looks good to me as a first iteration.
we might have some updates on the "what" and "why" when updating the "how".

@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: keithmattix, nirrozenbaum, shaneutt

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:
  • OWNERS [keithmattix,nirrozenbaum,shaneutt]

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. size/M Denotes a PR that changes 30-99 lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Egress Gateways

9 participants