-
Notifications
You must be signed in to change notification settings - Fork 337
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
design new external service resource #6330
Comments
Think about this in the context of a lambda as well |
Take into account this issue when redesigning kumahq/kuma-gui#1529 |
do you mean consuming in Kuma a lambda exposed by a AWS API gateway? if so then what specific things do we need to worry about? If I'm reading things right lambdas just get a domain like
the problem here is that we're getting multiple externalservices pointing to the same domain or is it something else? I think I found the original issue, it's probably about using https://www.envoyproxy.io/docs/envoy/latest/configuration/http/http_filters/aws_lambda_filter |
xref: #4758 |
Description
For #1496 we need to move external service to be namespace based. It's a good time to rethink this resource and improve it.
Rough design from a thinking session:
Each instance of a resource is an envoy cluster.
Is each instance inside the resource a different envoy endpoint? If yes can we have different TLS config for example (seems like it)?
Should we disallow having an internal and an external service with the same name? --> Probably
There are a few issues around ES that we should take into consideration for this:
kuma.io/zone
tag behave differently w/ and w/o ZoneEgress #6352The text was updated successfully, but these errors were encountered: