enable istio as a provider + configuring destinationRule#1381
enable istio as a provider + configuring destinationRule#1381k8s-ci-robot merged 3 commits intokubernetes-sigs:mainfrom
Conversation
|
Welcome @Gregory-Pereira! |
|
Hi @Gregory-Pereira. Thanks for your PR. I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
✅ Deploy Preview for gateway-api-inference-extension ready!
To edit notification comments on pull requests, go to your Netlify project configuration. |
74bed9c to
0c082b8
Compare
|
Meta-question here; does a destination rule have to be provided at the time of inferencePool creation? I don't fully understand the usecase here, and so, to me, it looks like we are just extracting all the Said another way; what are we simplifying by exposing the entire CRD in the helm chart? |
The key reason why I wanted this change, is because to properly route traffic with Istio we need a What we do currently (which is definitely not ideal) is create the destination rule in the
In my eyes we are simplifying the user experience. AFAICT, this chart does not support Definitely open to alternatives if you had anything better in mind. |
0c082b8 to
0c5665d
Compare
| apiVersion: networking.istio.io/v1beta1 | ||
| kind: DestinationRule |
There was a problem hiding this comment.
Do we have to use Istio specific APIs (DestinationRule) or standard GW APIs can be used instead?
(for example: BackendTrafficPolicy and BackendTLSPolicy
https://gateway-api.sigs.k8s.io/api-types/backendtrafficpolicy/
https://gateway-api.sigs.k8s.io/api-types/backendtlspolicy/?h=backendtlspolicy)
There was a problem hiding this comment.
Definitely open to it if you want to contribute an alternative, this is just beyond the scope of this initial implementation for integration with llm-d
|
Great discussions between @Gregory-Pereira and @kfswain . The part that it creates a But if that's our goal (hide unnecessary complexity for most |
0c5665d to
ce3627c
Compare
ca7ea49 to
f6f6e5c
Compare
|
This PR needs a link to an issue or a more detailed description of what the problem is and how this PR fixes it. /hold |
|
xref: #1475 that refactors the setup guide and may affect this PR. |
f5006c8 to
602f45f
Compare
Signed-off-by: greg pereira <grpereir@redhat.com>
Signed-off-by: greg pereira <grpereir@redhat.com>
Signed-off-by: greg pereira <grpereir@redhat.com>
602f45f to
050fd49
Compare
|
Any update on this? I would like to know if the community is open to this feature, to prevent me from continually having to rebase if there is no interest here. |
I’d be happy to see this PR gets in. Istio is one of our main partners and ideally installing IGW through helm with istio as gateway should work out of the box. without this PR it’s required to create the DestinationRule manually. |
|
/ok-to-test |
|
/approve |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: Gregory-Pereira, kfswain The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
/unhold /lgtm |
* enable istio as a provider + configuring destinationRule Signed-off-by: greg pereira <grpereir@redhat.com> * document provider specific configurations Signed-off-by: greg pereira <grpereir@redhat.com> * remove default option, always create DesitnaitonRule with istio provider Signed-off-by: greg pereira <grpereir@redhat.com> --------- Signed-off-by: greg pereira <grpereir@redhat.com>
…sigs#1381) * enable istio as a provider + configuring destinationRule Signed-off-by: greg pereira <grpereir@redhat.com> * document provider specific configurations Signed-off-by: greg pereira <grpereir@redhat.com> * remove default option, always create DesitnaitonRule with istio provider Signed-off-by: greg pereira <grpereir@redhat.com> --------- Signed-off-by: greg pereira <grpereir@redhat.com>
cc @liu-cong