-
Notifications
You must be signed in to change notification settings - Fork 594
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cross namespace service #204
Comments
Please also have a look at kubernetes/ingress-nginx#2371 Breaking the namespace isolation of sharing secrets across namespaces in a controller for Kubernetes will certainly surprise users at the very least. The simplest solution would be to write a very trivial k8s controller which syncs your secret and then you don't need to worry about duplication. |
Hello, From what I understand, that would allow me to use the secret cross-namespace so I could have one certificate renew per host. That work, I still need to be able to use my ingress as I stated: One ingress which redirect to an "ExternalName" SVC which redirect to a standard SVC. One of my other case is this one: |
Please see kubernetes/kubernetes#17088 |
NOTE: GitHub issues are reserved for bug reports only.
For anything else, please join the conversation
in Kong Nation https://discuss.konghq.com/c/kubernetes.
Summary
I am trying to add an Ingress in namespace A, associated to a service S1 (referenced as
ExternalName
) in namespace A, linked to service S2 in namespace B.Kong Ingress controller version
0.2.2
Kong or Kong Enterprise version
0.14 CE
Kubernetes version
paste
kubectl version
outputEnvironment
uname -a
): Linux gke-prod-1-pool-8cpu-0cb67ce0-3x2f 4.14.56+ Status of controller? #1 SMP Sat Aug 11 23:13:59 PDT 2018 x86_64 Intel(R) Xeon(R) CPU @ 2.00GHz GenuineIntel GNU/LinuxWhat happened
I am trying to reference a service in an Ingress from another namespace. I know this is not directly possible, so I added a service as external name. Relevant configuration:
Now, when I run
curl "https://api.my-host.com/identity"
, kong response isProbably because a wrong
port
is usedFor information, everything is OK if my ingress is directly in the correct namespace, EG:
And everything is working if I define my port explicitly:
Samples has been tested on my environment with the correct host.
I would like to be able to define my ingress in another namespace using a port defined in another service. This will allow, in my case, to only have 1 SSL certificate generated for all services served under "api.my-host.com".
For information, SSL is working when the ingress is in the correct namespace but my secret is in another namespace.
Expected behavior
Kong proxying to my pod on port 8030
Steps To Reproduce
port
andtargetPort
port
equal to theport
of service S1The text was updated successfully, but these errors were encountered: