-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add IPv4/IPv6 dual-stack support #563
Comments
Cross Reference with kubernetes/kubernetes: Issue #62822 |
Thanks for the update! /assign @leblancd |
@idvoretskyi - No design doc yet, but we'll start collaborating on one shortly. |
Does this mean Kubernetes Ingress will support Dual-Stack ? |
@sb1975 - Regarding dual-stack ingress support, that's something we'll need to hash out, but here are my preliminary thoughts:
|
@leblancd : So here is the scenario :
|
@sb1975 - Good question re. the NGINX ingress controller with dual-stack. I'm not an expert on the NGINX ingress controller (maybe someone more familiar can jump in), but here's how I would see the work flow:
As for helping and getting involved, this would be greatly appreciated! We're about to start working in earnest on dual-stack (it's been a little delayed by the work in getting CI working for IPv6-only). I'm hoping to come out with an outline for a spec (Google Doc or KEPs WIP doc) soon, and would be looking for help in reviewing, and maybe writing some sections. We'll also DEFINITELY need help with official documentation (beyond the design spec), and with defining and implementing dual-stack E2E tests. Some of the areas which I'm still a bit sketchy on for the design include:
We're also considering an intermediate "dual-stack at the edge" (with IPv6-only inside the cluster) approach, where access from outside the cluster to K8s services would be dual-stack, but this would be mapped (e.g. via NGINX ingress controller) to IPv6-only endpoints inside the cluster (or use stateless NAT46). Pods and services in the cluster would need to be all IPv6, but the big advantage would be that dual-stack external access would be available much more quickly from a time-to-market perspective. |
/milestone 1.12 |
@leblancd / @caseydavenport - I'm noticing a lot of discussion here and a milestone change. |
@justaugustus - Yes, this should be moved to 1.12. Do I need to delete a row in the release spreadsheet, or is there anything I need to do to get this changed? |
@leblancd I've got it covered. Thanks for following up! :) |
@leblancd @kubernetes/sig-network-feature-requests -- This feature was removed from the previous milestone, so we'd like to check in and see if there are any plans for this in Kubernetes 1.12. If so, please ensure that this issue is up-to-date with ALL of the following information:
Set the following:
Please note that the Features Freeze is July 31st, after which any incomplete Feature issues will require an Exception request to be accepted into the milestone.In addition, please be aware of the following relevant deadlines:
Please make sure all PRs for features have relevant release notes included as well. Happy shipping! |
@leblancd -- |
Hi @justaugustus - Beta status will need to slip into Kubernetes 1.13. We are making (albeit slow) progress on the design KEP (kubernetes/community#2254), and we're getting close to re-engaging with the CI test PR, but the Kubernetes 1.12 target was a bit too optimistic. I'll update the description/summary above with the information you requested earlier. Thank you for your patience. |
Good question - what are the rules to trigger PRR? Just the PRR files right? Which ugh, was not included. WE NEED TOOOOOOOOOLS |
If the stage changes, then it is supposed to validate whether a PRR approval exists for that stage. maybe it's broken? |
oh...status is wrong, it should be "implementable" until it's completely done. the CI probably only checks "implementable" KEPS for that validation |
Thanks @johnbelamaric @thockin. Heads up that we see this and will update according and will reach out should we have any questions. |
Thanks @lachie83 for making the changes. The Enhancement is all good for the enhancements freeze now. :) Thanks @johnbelamaric @thockin for pointing to the issue. It was a useful learning. |
Code changes - kubernetes/kubernetes#104691 |
Hello @lachie83 👋 Checking in once more as we approach 1.23 code freeze at 6:00 pm PST on Tuesday, November 16. Please ensure the following items are completed:
As always, we are here to help should questions come up. Thank you so much! 🙂 |
@Priyankasaggu11929 - Confirming that we are good to go for the release. Doc updates recently merged via kubernetes/website#29386 |
Thanks so much the update, @lachie83. This enhancement status is all green & tracked. 🙂 |
Tests update is in kubernetes/test-infra#24488 (the bot added it to 1.24 but it's for 1.23). |
Reminder: Remove gate in 1.26, milestone updated |
/stage stable |
@thockin gate longer exists in code except in cloud provider area. |
Feature Description
IPv4/IPv6 dual-stack support and awareness for Kubernetes pods, nodes, and services
Corresponding kubernetes/kubernetes Issue: kubernetes/kubernetes#62822
The text was updated successfully, but these errors were encountered: