Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Expose NAT gateway IP in the shoot cluster #606

Open
pbochynski opened this issue Dec 7, 2022 · 4 comments
Open

Expose NAT gateway IP in the shoot cluster #606

pbochynski opened this issue Dec 7, 2022 · 4 comments
Labels
kind/enhancement Enhancement, improvement, extension lifecycle/rotten Nobody worked on this for 12 months (final aging stage)

Comments

@pbochynski
Copy link

pbochynski commented Dec 7, 2022

How to categorize this issue?

/kind enhancement

What would you like to be added:
Gardener can create multiple NAT Gateways: https://gardener.cloud/docs/extensions/infrastructure-extensions/gardener-extension-provider-azure/docs/usage-as-end-user/#example-shoot-manifest-zoned-with-nat-gateways-per-zone
Please expose NAT Gateway IP(s) in the shoot cluster using a custom resource or config map (e.g. shoot-info)

Why is this needed:
There is no simple way to figure out what is the IP address (addresses) of the NAT Gateway in the unified way (the only way is to use cloud provider API to figure it out).
Users need it for configuring IP whitelisting in various services.

Maybe you can reopen this proposal: gardener/gardener#3873

@gardener-prow gardener-prow bot added the kind/enhancement Enhancement, improvement, extension label Dec 7, 2022
@gardener-prow
Copy link

gardener-prow bot commented Dec 7, 2022

@pbochynski: The label(s) area/todo cannot be applied, because the repository doesn't have them.

In response to this:

How to categorize this issue?

/area TODO
/kind enhancement

What would you like to be added:
Gardener can create multiple NAT Gateways: https://gardener.cloud/docs/extensions/infrastructure-extensions/gardener-extension-provider-azure/docs/usage-as-end-user/#example-shoot-manifest-zoned-with-nat-gateways-per-zone
Please expose NAT Gateway IP(s) in the shoot cluster using a custom resource or config map (e.g. shoot-info)

Why is this needed:
There is no simple way to figure out what is the IP address (addresses) of the NAT Gateway in the unified way (the only way is to use cloud provider API to figure it out).
Users need it for configuring IP whitelisting in various services.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@rfranzke rfranzke transferred this issue from gardener/gardener Dec 7, 2022
@kon-angelo
Copy link
Contributor

@pbochynski We are considering exposing the infrastructure provider status as an additional field to the shoot status. Would that work as a way to access this information or do you specifically need this info to be exposed in the shoot cluster?

@pbochynski
Copy link
Author

In our case (Kyma), we do not expose the garden project to end users, so they don't have access to the shoot status. It would be better to have it propagated to the shoot. But we also can do the replication ourselves. Having the IP in the shoot status will help anyway, as we don't have to use cloud provider APIs and use Gardener API as an abstraction on top.

@gardener-robot gardener-robot added the lifecycle/stale Nobody worked on this for 6 months (will further age) label Aug 16, 2023
@pbochynski
Copy link
Author

It is still valid

@gardener-robot gardener-robot added lifecycle/rotten Nobody worked on this for 12 months (final aging stage) and removed lifecycle/stale Nobody worked on this for 6 months (will further age) labels May 30, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/enhancement Enhancement, improvement, extension lifecycle/rotten Nobody worked on this for 12 months (final aging stage)
Projects
None yet
Development

No branches or pull requests

3 participants