Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Document how to support multiple GatewayClass instances #5237

Open
1 of 2 tasks
mheap opened this issue Nov 27, 2023 · 5 comments · May be fixed by Kong/docs.konghq.com#7551
Open
1 of 2 tasks

Document how to support multiple GatewayClass instances #5237

mheap opened this issue Nov 27, 2023 · 5 comments · May be fixed by Kong/docs.konghq.com#7551
Assignees

Comments

@mheap
Copy link
Member

mheap commented Nov 27, 2023

Is there an existing issue for this?

  • I have searched the existing issues

Problem Statement

From @battlebyte:

Following the example in the GatewayClass documentation about creating two GatewayClass resources for Internet facing traffic and private facing traffic, we could create two GatewayClass definitions like the following:

kind: GatewayClass
metadata:
  name: internet
spec:
  controllerName: "konghq.com/internet-controller"
---
kind: GatewayClass
metadata:
  name: private
spec:
  controllerName: "konghq.com/private-controller"

I deploy two different instances of KIC and I want one instance to process “internet” manifests and the other instance “private” manifests. The GatewayClass specification says that the GatewayClass.spec.controller field determines the controller implementation responsible for managing the GatewayClass . What parameter/value do I need to use in the Helm chart to link a KIC deployment to konghq.com/internet-controller and the other deployment to konghq.com/private-controller ?

And a follow up question: is it possible for one single KIC deployment to be the implementation for multiple GatewayClasses?

Proposed Solution

From @czeslavo:

You can set ingressController.env.gateway_api_controller_name to konghq.com/internet-controller) or konghq.com/private-controller to make KIC reconcile the GatewayClasses you've created.

Currently, we only support a single GatewayClass per KIC instance (analogically to a single IngressClass).

Additional information

Where does this live on docs.konghq.com? Maybe under Guides->Security?

Acceptance Criteria

  • As a user I know how to deploy a KIC instance using a non-default controllerName by reading docs.konghq.com
@rainest
Copy link
Contributor

rainest commented Dec 1, 2023

And a follow up question: is it possible for one single KIC deployment to be the implementation for multiple GatewayClasses?

Not for the use case proposed. Kong binds all routing configuration to all proxy listens equally. If you configure an internal address and external address for proxy_listen, all your routes will be accessible at either address.

Although we have source and destination IP matching configuration for routes, this is only available for stream subsystem plain TCP and UDP routes. Adding support for this in the http subsystem would probably be insufficient, as you'd still have all kong.conf-level configuration associated with a single proxy listen. The ip-restriction plugin is also a poor candidate to hack in support, as doing so would prevent users from configuring their own for any restrictions beyond "entire LAN network".

Network restriction concerns aside, supporting multiple classes in a single proxy install introduces a whole host of collision concerns that are entirely outside the spec. Merging Gateways into a single proxy instance makes understanding and correctly designing your configuration (and our implementation) much more complicated. Gateway merger is at least explicitly covered in the spec, but it's been an area where we've continued to find complicated edge cases with no good and intuitive behavior to codify.

Similarly merging GatewayClasses would add an additional layer to that complexity, and further isn't covered in the spec, so there's no roadmap for how we'd handle mutually incompatible configuration. Though there is broad language regarding this

Implementations MAY choose only one GatewayClass out of the pool of otherwise acceptable GatewayClasses if they can only reconcile one, or, if they are capable of reconciling multiple GatewayClasses, they may also choose as many as they like.

there's nothing guiding what reconciliation means or what conditions the implementation must satisfy. I take that to read more as that we could, for example, set up the operator to reconcile multiple classes by creating separate proxy instances for them.

@mlavacca
Copy link
Member

mlavacca commented Dec 4, 2023

Network restriction concerns aside, supporting multiple classes in a single proxy install introduces a whole host of collision concerns that are entirely outside the spec. Merging Gateways into a single proxy instance makes understanding and correctly designing your configuration (and our implementation) much more complicated. Gateway merger is at least explicitly covered in the spec, but it's been an area where we've continued to find complicated edge cases with no good and intuitive behavior to codify.

There is a WIP GEP related to merging gateways upstream (the first PR hasn't been merged yet).
However, even with such a spec improvement, it won't be possible to merge gateways referring to different GatewayClasses, as in this issue example.

And a follow up question: is it possible for one single KIC deployment to be the implementation for multiple GatewayClasses?

Today It is possible to reconcile multiple GatewayClasses by using a single KIC instance (network concerns aside, as Travis mentioned), but they need to refer to the same ControllerName, as each KIC instance is bound to a single ControllerName:

Each implementation is expected to claim a domain-prefixed string value (like example.com/example-ingress) as its controllerName.

API Documentation states that one ControllerName must be picked by each implementation (even though the wording there is not that categorical, and it probably should be).

@xiaoronglv
Copy link

Hi @mlavacca, @mheap and @rainest ,

Good day!

From @czeslavo:
You can set ingressController.env.gateway_api_controller_name to konghq.com/internet-controller) or konghq.com/private-controller to make KIC reconcile the GatewayClasses you've created.

I would like to follow this instruction and deploy two instances of Kong Gateway to my AWS EKS cluster. Here is my values.yaml for my second Kong instance, but it seems not to be working:

gateway:

  proxy:
    http:
      enabled: true
  autoscaling:
    enabled: true
  ingressController:
    env:
      gateway_api_controller_name: 'konghq.com/Kong-two-controller'

I used the following command to deploy the second instance:

helm install kong-2 kong/ingress -n kong -f ./values.yaml

Did you deploy your two Kong instances through Helm? How did you configure the Gateway Controller Name in the values.yaml file?

I couldn't find the definition either in the source code of ingress helm chart or kong helm chart.

I would appreciate it if you could share your values files as an example.

@xiaoronglv
Copy link

xiaoronglv commented Jun 6, 2024

The kong document recommend to do it in this way, but it seems stales as well.

helm upgrade --install kong-internal kong/ingress -n internal --create-namespace --set controller.ingressController.ingressClass=internal
helm upgrade --install kong-external kong/ingress -n external --create-namespace --set controller.ingressController.ingressClass=external

Reference

@sirTangale
Copy link

The kong document recommend to do it in this way, but it seems stales as well.

helm upgrade --install kong-internal kong/ingress -n internal --create-namespace --set controller.ingressController.ingressClass=internal
helm upgrade --install kong-external kong/ingress -n external --create-namespace --set controller.ingressController.ingressClass=external

Reference

this if using kong ingress controller [ ingressclass api ] not gatewayapi [ new ]

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging a pull request may close this issue.

6 participants