-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature: Annotation to disable HTTP2 per host #5983
Comments
@Nuru thank you for writing this request with some context and analysis of the previous attempts. |
@aledbf wrote
A few ways:
I suppose we cannot really avoid complaints, but we have a solid answer for them: non-TLS protocol does not support auto-negotiation of protocol. In other words, it just does not work. |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Does that seem sufficient to address the prior concerns @aledbf ? |
/remove-lifecycle stale |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-contributor-experience at kubernetes/community. |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-contributor-experience at kubernetes/community. |
/remove-lifecycle rotten @aledbf What can I do to move this forward? |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-contributor-experience at kubernetes/community. |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-contributor-experience at kubernetes/community. |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close |
@k8s-triage-robot: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
I need this too. Can we have this reopened please? |
We also need this ability. |
We need this too, can someone please pick it up ? |
let me reopen it /reopen |
@tao12345666333: Reopened this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/triage accepted @fnkr @johngirvin @arpit20adlakha if you want to see this feature, we are happy for any contributions :) /help |
@iamNoah1: GuidelinesPlease ensure that the issue body includes answers to the following questions:
For more details on the requirements of such an issue, please see here and ensure that they are met. If this request no longer meets these requirements, the label can be removed In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/lifecycle frozen |
@nicknovitski how far from this proposal is your existing work on this? |
This issue is labeled with You can:
For more details on the triage process, see https://www.kubernetes.dev/docs/guide/issue-triage/ /remove-triage accepted |
This issue is currently awaiting triage. If Ingress contributors determines this is a relevant issue, they will accept it by applying the The Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
This feature will be very useful and I have number of users looking for this on IBM Cloud deployments. Can we triage this ? |
Can not be achieved this using gateway API? ingress API has been GA for a long time, growing the scope of this project with annotations fragments the ecosystem and reduces the capacity to standardize it |
@rahulsb are you willing to implement, maintain, triage bugs, etc for this feature? If so, please feel free to open a PR for it |
We are not actively adding new features as we migrate our focus to ingate. We have discussed at the gateway-api community meeting and our latest ingress-nginx Kubcon Maintainer talk. The repo to follow along is at: https://github.com/kubernetes-sigs/ingate /close |
@strongjz: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
This feature has been requested and attempted a few times, but keeps losing steam.
I would like to revive it because it should now be relatively easy to implement and there are precedents for it.
Specifically, I would like to have the annotation
nginx.ingress.kubernetes.io/use-http2: "false"
disable HTTP2 for that host. We already havenginx.ingress.kubernetes.io/server-snippet
which can only be used once per host and which affects all paths for the host, but because of the way HTTP2 support is configured (as part of thelisten
directive), the server snippet annotation cannot be used to disable HTTP2 support for the server. We also have thenginx.ingress.kubernetes.io/use-regex
which affects all paths for the host, regardless of which Ingress the paths are defined on.I think #2189 was not allowed because the fact that it applies to the entire host was seen as unacceptable, but this kind of thing, when necessary for architectural reasons, is acceptable now when properly documented. #2482 was a different way to accomplish the same goal and was proposed as a way around a bug in nginx and lost steam when the bug was fixed.
Note that I am not asking for an annotation that would allow HTTP2 support on port 80 or any non-TLS port, which I think is what got #2402 shut down. What I am asking for is an annotation that turns off the now default HTTP2 support for TLS ports on a per-host/server basis.
Proposed documentation:
Use case: We have a large cluster with many hosts and we want to have HTTP2 support for nearly all of them, but some break when HTTP2 support is turned on and we want to disable it only for those hosts. It is acceptable that this be a per-host setting like the server snippet.
/kind feature
The text was updated successfully, but these errors were encountered: