Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support routing and scaling based on path #338

Closed
philomory opened this issue Dec 11, 2021 · 22 comments · Fixed by #677
Closed

Support routing and scaling based on path #338

philomory opened this issue Dec 11, 2021 · 22 comments · Fixed by #677
Labels
enhancement New feature or request good first issue Good for newcomers

Comments

@philomory
Copy link

philomory commented Dec 11, 2021

The interceptor should be able to route requests for the same host to different services based on the request path.

Use-Case

When using an ingress controller, you can create Ingress objects that route different requests for the same host to different backend services, depending on the path portion of the request. This can be done by within a single Ingress object or across multiple of them.

When using the HTTP add-on, however, this won't work; you can, of course, still define multiple Ingress objects with different paths (or one Ingress object with multiple path entries), but they all need to point to the keda-add-ons-http-interceptor-proxy as their backend. Unfortunately, once the interceptor has intercepted them, it's not able to route them or scale them appropriately. The routing portion of this problem could be cumbersomely worked around by having a second ingress controller that the proxy could just route all traffic too (actually you could just make the proxy a service of type LoadBalancer and only have an ingress controller behind the proxy), but that still means that the scaling won't be handled as intended.

Consider the following setup (pre-KEDA):

apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
  name: example-media
  annotations:
    kubernetes.io/ingress.class: nginx
spec:
  rules:
    - host: api.example.com
      http:
        paths:
          - path: /media
            pathType: Prefix
            backend:
              service:
                name: media-provider
                port:
                  number: 80
---
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
  name: example-customers
  annotations:
    kubernetes.io/ingress.class: nginx
spec:
  rules:
    - host: api.example.com
      http:
        paths:
          - path: /customer
            pathType: Prefix
            backend:
              service:
                name: customer-provider
                port:
                  number: 80

This will route a request for e.g. https://api.example.com/media/foo to the media-provider service, and a request to https://api.example.com/customer/bar?baz=1 to the customer-provider service.

Once you put the KEDA HTTP Add-on in place, things begin to break down:

apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
  name: example-media
  annotations:
    kubernetes.io/ingress.class: nginx
spec:
  rules:
    - host: api.example.com
      http:
        paths:
          - path: /media
            pathType: Prefix
            backend:
              service:
                name: keda-add-ons-http-interceptor-proxy
                port:
                  number: 80
---
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
  name: example-customers
  annotations:
    kubernetes.io/ingress.class: nginx
spec:
  rules:
    - host: api.example.com
      http:
        paths:
          - path: /customer
            pathType: Prefix
            backend:
              service:
                name: keda-add-ons-http-interceptor-proxy
                port:
                  number: 80
---
kind: HTTPScaledObject
apiVersion: http.keda.sh/v1alpha1
metadata:
  name: media-api
spec:
  host: "api.example.com"
  scaleTargetRef:
    deployment: media-provider
    service: media-provider
    port: 80
    targetPendingRequests: 100
---
kind: HTTPScaledObject
apiVersion: http.keda.sh/v1alpha1
metadata:
  name: customer-api
spec:
  host: "api.example.com"
  scaleTargetRef:
    deployment: customer-provider
    service: customer-provider
    port: 80
    targetPendingRequests: 100

Both HTTPScaledObject specs have the same host field, and there's no path field, so there's no way for the scaler to know where to route traffic to. Even if you put the Ingress Controller "behind" the interceptor (once a cluster-global installation is possible) to handle the routing, there's still no way for the scaler to know that when a bunch of requests come in for a /customer endpoint, it should scale the customer-provider Deployment rather than the media-provider Deployment.

To resolve this problem, the HTTPScaledObject field should have an optional spec.path field, and possibly also an optional spec.pathType field. For example:

apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
  name: example
  annotations:
    kubernetes.io/ingress.class: nginx
spec:
  rules:
    - host: api.example.com
      http:
        paths:
          - path: /media
            pathType: Prefix
            backend:
              service:
                name: keda-add-ons-http-interceptor-proxy
                port:
                  number: 80
          - path: /customer
            pathType: Prefix
            backend:
              service:
                name: keda-add-ons-http-interceptor-proxy
                port:
                  number: 80
---
kind: HTTPScaledObject
apiVersion: http.keda.sh/v1alpha1
metadata:
  name: media-api
  path: /media
spec:
  host: "api.example.com"
  scaleTargetRef:
    deployment: media-provider
    service: media-provider
    port: 80
    targetPendingRequests: 100
---
kind: HTTPScaledObject
apiVersion: http.keda.sh/v1alpha1
metadata:
  name: customer-api
spec:
  host: "api.example.com"
  path: /customer
  scaleTargetRef:
    deployment: customer-provider
    service: customer-provider
    port: 80
    targetPendingRequests: 100

Specification

For simplicity, I think you could get away with supporting only either 0 or 1 paths per HTTPScaledObject resource. Resolution would work as follows:

  1. Any HTTPScaledObject which omits spec.path is equivalent to one which specifies spec.path: /
  2. If spec.pathType is implemented at all, it should have the same basic semantics as spec.rules[*].http.paths[*].pathType in Ingress, except that the only supported values would be Prefix and Exact (no need to include historical baggage like ImplementationSpecific since there's only one implementation and there's also no history to derive baggage from)
  3. If spec.pathType is implemented at all, omitting spec.pathType will be equivalent to spec.pathType: Prefix
  4. When evaluating a request, the interceptor should collect all HTTPScaledObjects with a matching host and evaluate them as follows:
    1. If spec.pathType is implemented, check all matched HTTPScaledObject resources with spec.pathType: Exact and see if the spec.path listed in the HTTPScaledObject exactly matches the path part of the request URI. If so, the first match found is selected.
    2. If spec.pathType isn't implemented, or if none of the Exact type HTTPScaledObjects matched the path, take the remaining HTTPScaledObjects matching the host field and sort them by the length of the spec.path field. Check each resource's spec.path field to see if it is an "element-wise prefix" of the path portion of the request URI, given a separator of "/"; the first match found is selected.
  5. Whichever single HTTPScaledObject resource was selected in step 4, route the request to the service specified in that HTTPScaledObject, and scale the deployment specified in that HTTPScaledObject accordingly.

This procedure defined in step 4 is essentially the same as that defined for matching requests to Ingress objects by the networking.k8s.io API, except for the absence of the ImplementationSpecific path type.

With Ingress, users have the option to specify multiple paths for the same host (or even multiple hosts) in a single Ingress resource, but, I think that would be unnecessary complexity for HTTPScaledObject; simply creating a distinct HTTPScaledObject per path/prefix should suffice.

@arschles
Copy link
Collaborator

arschles commented Dec 14, 2021

@philomory this seems very reasonable since we can easily save a lot of work and moving parts for operators. would you be interested in implementing this feature? no problem if not, just want to check.

By the way, thanks for the detailed explanation. that was very helpful for my understanding

@arschles arschles added the enhancement New feature or request label Dec 14, 2021
@arschles arschles added this to the v0.2.1 milestone Dec 14, 2021
@philomory
Copy link
Author

I would love to help implement this, but I don't think I have the required time or the required skillset. I can sort of read Go, a little bit, but I'm not going to be able to write Go to an acceptable level of quality for a project like this.

@arschles
Copy link
Collaborator

arschles commented Jan 5, 2022

@philomory no problem. We can implement it. Before that, though, I'd like to get clarity on how this feature should interact with #281. Do you have any thoughts?

@philomory
Copy link
Author

@arschles That's a good question! I don't have a strong opinion, since we wouldn't be using the wildcard support, ourselves. That said, I think it probably should be supported to use both at once, even if I wouldn't recommend anyone actually do so. Ingress supports both at once, so HTTPScaledObject probably should as well.

There's no (explicit) documentation that I can see on the behavior of Ingress in situations like this:

apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
  name: ingress-specific-host
spec:
  rules:
  - host: "foo.bar.com"
    http:
      paths:
      - pathType: Prefix
        path: "/"
        backend:
          service:
            name: service1
            port:
              number: 80
---
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
  name: ingress-wildcard-host
spec:
  rules:
  - host: "*.foo.com"
    http:
      paths:
      - pathType: Prefix
        path: "/api"
        backend:
          service:
            name: service2
            port:
              number: 80

That is, one of those has an exact match of the host but a less specific path prefix, and the other has a more specific path prefix but only a wildcard host match (assuming a request for https://foo.bar.com/api). Whatever the behavior of Ingress is in this situation, though, HTTPScaledObject should probably match it. Although it's possible that the behavior in this situation is left up to the individual Ingress Controller, which would be unfortunate, if understandable.

@arschles
Copy link
Collaborator

@philomory perhaps this would be a start to a unified spec for path-based routing and wildcard support:

  1. Use a * character anywhere in the hostname or path definition
  2. The most specific declaration that matches an incoming request will match, and the request will be routed to the appropriate backend. For example, for a request to foo.com/a/b/c
    • The paths *.foo.com/a/* and foo.com/* will match the latter. This is because the former requires a subdomain to come before the foo.com
    • But, the paths *foo.com/a/* and foo.com/* will match the former because the /a/* after foo.com is more specific in the former than the /* in the latter
  3. If two identical or potentially conflicting patterns are submitted in two different HTTPScaledObjects, the one submitted last will have an error reported on its status field, and will not take effect.

What are your thoughts?

cc/ @comron and @andresrsanchez because you are both involved with #281

I'd ultimately like to come up with an over-arching issue that covers all use-cases in here and #281, before we proceed with implementing anything.

@philomory
Copy link
Author

philomory commented Jan 12, 2022

I think there are significant advantages to matching the specified behavior of ingress.networking.k8s.io/v1 where possible; although if there really is no specification for how multiple potential wildcard hostname matches are resolved, then presumably we'd have to choose something for HTTPScaledObject. That said, I could probably be convinced by a more detailed proposal for the unified spec (and I'm not the one implementing it, so in the end I'll be pretty happy as long as we end up with something workable overall).

Three up-front concerns come to mind:

  1. Wildcards can be used anywhere? foo.*.bar.com isn't valid in DNS, it's not valid in TLS, and it's not valid in Ingress (though people have asked for it to be made valid)
  2. Wildcards can be used anywhere? I understand that a request for foo.com/a/b/c would match foo.com/a/b/* with higher priority than foo.com/a/*, but what about if we had both foo.com/a/b/*, foo.com/a/*/c and foo.com/*/b/c? Which one would be matched? Or are those "potentially conflicting patterns"?
  3. Just, in general, what are the "potentially conflicting patterns" that would raise an error? It can't simply be any two patterns that could match the same string, because then foo.com/a/* and foo.com/* couldn't both be defined on the same server, which would certainly be problematic.

In general I don't think it's a good idea to define rules that say resource b is invalid because resource a already exists (with the obvious exception of multiple resources of the same type in the same namespace with the same name); I think it's better to simply define precedence rules that clearly specify which option will be chosen when multiple valid options exist (something that the Ingress documentation spells out for paths but oddly omits for hosts)

@arschles arschles added the good first issue Good for newcomers label Jan 21, 2022
@arschles arschles modified the milestones: v0.3.0, v0.5.0 Jan 27, 2022
@arschles
Copy link
Collaborator

@philomory you're right, there are indeed holes in my spec. perhaps you're right and it's best to just duplicate the ingress rules, along with a rule for overlapping wildcard hosts, as you said. I don't know enough of the specifics of those rules and I have to go read up. Do you have any preliminary ideas on what do with overlapping wildcard hosts?

@philomory
Copy link
Author

@arschles So, I did some digging, and I finally found some at least some information on the mandated behavior of Ingress, in the API reference (Emphasis mine):

Host is the fully qualified domain name of a network host, as defined by RFC 3986. Note the following deviations from the "host" part of the URI as defined in RFC 3986: 1. IPs are not allowed. Currently an IngressRuleValue can only apply to the IP in the Spec of the parent Ingress. 2. The : delimiter is not respected because ports are not allowed. Currently the port of an Ingress is implicitly :80 for http and :443 for https. Both these may change in the future. Incoming requests are matched against the host before the IngressRuleValue. If the host is unspecified, the Ingress routes all traffic based on the specified IngressRuleValue.

The immediately relevant portion (the part I bolded) is fairly terse, and honestly could be interpreted multiple ways. I decided to verify the behavior of the specific controller we use, ingress-nginx:

  • ingress-nginx uses Ingress objects to construct an nginx.conf file.
  • As such, each host field becomes a server block, and each path field becomes a location block within that server block.
  • If there are multiple Ingresses with the same host, then the respective location blocks are all merged into a single shared server block in the final nginx.conf file.
  • When handling a request, Nginx always chooses which server block to use to handle the request before it ever starts looking at the request path.
  • When choosing which server block to use, Nginx will prefer an exact match to a wildcard match.

The practical upshot of this is that ingress-nginx always chooses a server block based on the best (most specific) match of the hostname, before it even starts looking at the path. Indeed, if you have one ingress with host: foo.example.com and path: /bar, and another ingress with host: *.example.com and path: /baz, a request for foo.example.com/baz will simply result in a 404 being returned, because the more specific match with the foo.example.com ingress means that the *.example.com ingress is not checked at all.

This behavior may be specific to ingress-nginx, but, I think it's fairly reasonable to assume that this is what "Incoming requests are matched against the host before the IngressRuleValue" is meant to mean.

All that said, I did a bit more digging around, because a full-on replacement for the entirety of Ingress is already in development by sig-networking, the Gateway API. The specification for the Gateway API gets a lot more specific about how ambiguity/multiple-matches is meant to be handled:

Proxy or Load Balancer routing configuration generated from HTTPRoutes MUST prioritize rules based on the following criteria, continuing on ties. Precedence must be given to the the Rule with the largest number of:

  • Characters in a matching non-wildcard hostname.
  • Characters in a matching hostname.
  • Characters in a matching path.
  • Header matches.
  • Query param matches.

(It's worth looking at the actual specification, there's a lot of interesting detail in there).

There's also a more general section on resolving conflicts.

Obviously, the Gateway API is still in alpha and isn't widely supported (and also, may change), but the way the rules are currently written seems to indicate that the behavior of the ingress-nginx is probably the way to go.

@arschles
Copy link
Collaborator

@philomory thanks for this detail. This gives me an idea - I wonder if we should simply reference an Ingress from the HTTPScaledObject. I would hate to re-implement all of these rules and keep them current with changes going forward.

With this scheme, HTTPScaledObjects would keep the information on the backing Deployment, but the addon would read the referenced Ingress for all the routing information. This way, the interceptor would still need to understand and implement most of the rules, but would not need to duplicate them inside the HTTPScaledObject.

WDYT?

@philomory
Copy link
Author

@arschles For the project, that does sound like a great idea (although it may become more complicated once the Gateway API is GA, since, then what do you do? I guess you could reference by kind, in the same way that KEDA itself can have scaleTargetRefs with other kinds than Deployments).

The only problem I see is that, currently, HTTPScaledObject is like a much-simplified version of Ingress. For example, the following is an entirely valid Ingress object, that means essentially the same thing as the two ingresses in my previous example combined:

apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
  name: ingress-specific-host
spec:
  rules:
  - host: "foo.bar.com"
    http:
      paths:
      - pathType: Prefix
        path: "/"
        backend:
          service:
            name: service1
            port:
              number: 80
  - host: "*.foo.com"
    http:
      paths:
      - pathType: Prefix
        path: "/api"
        backend:
          service:
            name: service2
            port:
              number: 80

spec.rules and spec.rules.*.paths are both arrays, and while I tend never to include more than one of each per Ingress object, I'm sure other users do, especially depending on what Ingress Controller they use (for example the old aws-alb-ingress-controller - since replaced by the aws-load-balancer-controller - used to create one load balancer per Ingress object, so with that controller you were definitely incentivized to combine all your rules into a single Ingress object). I'm not sure if there's any other Ingress Controllers out there that still act that way, but, I'm sure there are people who prefer grouping all their rules into one Ingress anyway.

In any case, when presented with an Ingress object with multiple rules and multiple paths, I'm not sure how HTTPScaledObject should indicate which one it is meant to match; I see only three obvious options:

  1. The HTTPScaledObject matches all requests that a given Ingress object matches; if a user wants to scale different deployments depending on the host or path, they'll need to refactor their "mono-Ingress" into multiple separate Ingresses.
  2. The HTTPScaledObject allows indicating array indices to match, e.g.
    spec:
      routingRef:
        name: example
        kind: Ingress
        rule: 1
        path: 0
    This option feels super brittle and confusing.
  3. The HTTPScaledObject allows you to reference individual routing elements within the Ingress by name, e.g.
    spec:
      routingRef:
        name: example
        kind: Ingress
        host: foo.bar.com
        path: /
    This option is less confusing than option 2, but at this point, you don't really need the Ingress anymore, since you're already specifying the path and host right there in the HTTPScaledObject.

Another (less pressing) problem is that, for example, we have an older application which consists of multiple microservices behind an API gateway, and there's only one Ingress, which points to the API gateway (and the API gateway, in turn, routes traffic to different backend services depending on the request path; honestly the API Gateway's functionality became mostly redundant after we moved the application to Kubernetes, but it's not entirely redundant). Ultimately my goal for that particular application is to have HTTPScaledObject scale the appropriate backend microservice deployment based on the request path, even though all the traffic ends up getting routed to the API Gateway. If HTTPScaledObject references an Ingress to match traffic to scaling targets, we'd have to create a bunch of dummy Ingress objects that all route to the same place.

@tomkerkhove tomkerkhove removed this from the v0.5.0 milestone May 11, 2022
@tomkerkhove tomkerkhove moved this from Proposed to To Do in Roadmap - KEDA HTTP Add-On May 11, 2022
@stale
Copy link

stale bot commented Jul 10, 2022

This issue has been automatically marked as stale because it has not had recent activity. It will be closed in 7 days if no further activity occurs. Thank you for your contributions.

@stale stale bot added the stale All issues that are marked as stale due to inactivity label Jul 10, 2022
@philomory
Copy link
Author

I don't think this is stale, exactly, although personally I'm investigating at this point using a service mesh (linkerd) to scale off of traffic metrics as an alternative to using the KEDA http-add-on (there will probably be cases that the http-add-on adresses that service mesh metrics do not, and vice versa, but I don't think any of them apply to my situation specifically).

@stale
Copy link

stale bot commented Jul 17, 2022

This issue has been automatically closed due to inactivity.

@stale stale bot closed this as completed Jul 17, 2022
Repository owner moved this from To Do to Done in Roadmap - KEDA HTTP Add-On Jul 17, 2022
@gtskaushik
Copy link

This is a very crucial feature so that Keda http-add-on and ingress objects work in tandem. This issue should be re-opened

@yaliqin
Copy link

yaliqin commented Apr 3, 2023

This is a necessary feature for using http-add-on with ingress.

@jelical
Copy link

jelical commented Apr 27, 2023

Please, reopen this issue. Routing path's definitely should be supported - any complex app scenario usually have it.

@HongboFei
Copy link

I vote this feature too. I understand team not have much capacity, but we can put it in backlog items first. @tomkerkhove

@cregev
Copy link

cregev commented Apr 30, 2023

@arschles is this project maintained ? we are considering to add a solution for this but we are not sure it is maintained...

@tomkerkhove
Copy link
Member

This project is definitely still maintained but community driven. We definitely welcome contributions!

@cregev
Copy link

cregev commented May 1, 2023

@tomkerkhove thanks for the response... The reason I have asked is that this issue seems to be really important if one is willing to work with the Keda interceptor and path-based routing ... this use case is pretty standard in our scenarios ...

@tomkerkhove tomkerkhove reopened this May 2, 2023
@stale stale bot removed the stale All issues that are marked as stale due to inactivity label May 2, 2023
@similark
Copy link
Contributor

similark commented May 4, 2023

I started working on this
I'll appreciate some help integrating with the current setup, as we use this ONLY with nginx-ingress passing requests into the cluster, so for use-cases without path in the route table etc. it'll take more work

@tomkerkhove
Copy link
Member

I think this is related to @t0rr3sp3dr0's proposal in #605 as well

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request good first issue Good for newcomers
Projects
Status: Done
Development

Successfully merging a pull request may close this issue.

9 participants