-
Notifications
You must be signed in to change notification settings - Fork 168
enable istio as a provider + configuring destinationRule #1381
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
enable istio as a provider + configuring destinationRule #1381
Conversation
Welcome @Gregory-Pereira! |
Hi @Gregory-Pereira. Thanks for your PR. I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
✅ Deploy Preview for gateway-api-inference-extension ready!
To edit notification comments on pull requests, go to your Netlify project configuration. |
74bed9c
to
0c082b8
Compare
Meta-question here; does a destination rule have to be provided at the time of inferencePool creation? I don't fully understand the usecase here, and so, to me, it looks like we are just extracting all the Said another way; what are we simplifying by exposing the entire CRD in the helm chart? |
The key reason why I wanted this change, is because to properly route traffic with Istio we need a What we do currently (which is definitely not ideal) is create the destination rule in the
In my eyes we are simplifying the user experience. AFAICT, this chart does not support Definitely open to alternatives if you had anything better in mind. |
0c082b8
to
0c5665d
Compare
apiVersion: networking.istio.io/v1beta1 | ||
kind: DestinationRule |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Do we have to use Istio specific APIs (DestinationRule) or standard GW APIs can be used instead?
(for example: BackendTrafficPolicy
and BackendTLSPolicy
https://gateway-api.sigs.k8s.io/api-types/backendtrafficpolicy/
https://gateway-api.sigs.k8s.io/api-types/backendtlspolicy/?h=backendtlspolicy)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Definitely open to it if you want to contribute an alternative, this is just beyond the scope of this initial implementation for integration with llm-d
Great discussions between @Gregory-Pereira and @kfswain . The part that it creates a But if that's our goal (hide unnecessary complexity for most |
0c5665d
to
ce3627c
Compare
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: Gregory-Pereira The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
ca7ea49
to
f6f6e5c
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
From what I can tell from our Istio doc, this is needed for Istio routing to work. I tink this is a nice to have, and we can simplify the Istio installation doc once this is in.
New changes are detected. LGTM label has been removed. |
This PR needs a link to an issue or a more detailed description of what the problem is and how this PR fixes it. /hold |
xref: #1475 that refactors the setup guide and may affect this PR. |
Signed-off-by: greg pereira <[email protected]>
Signed-off-by: greg pereira <[email protected]>
Signed-off-by: greg pereira <[email protected]>
f5006c8
to
602f45f
Compare
PR needs rebase. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
cc @liu-cong