-
Notifications
You must be signed in to change notification settings - Fork 23
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Sandbox] KubeSlice #62
Comments
Please present to TAG - Network to provide additional awareness and understanding of what the project is and its scope with recommendation for align. |
Please present this project to tag network. |
Sure - will work with tag-network chairs to find a slot to present. |
Presented KubeSlice to TAG Network on 1/11. Thanks Nic Jackson @nicholasjackson, Lee Calcote @leecalcote and Lin Sun @istio for the opportunity to present it to the Network team and a good discussion. Presented slides are here. |
@leecalcote @linsun - does TAG network have a recommendation? |
@amye ack - I'm consulting @nicholasjackson for his recommendation as he helped us run the last meeting on 1/11. Will circle back. @pnavali please give me access to your slides - just sent a req in google docs. Thanks! |
@linsun - I have fixed the share settings on the doc - should be accessible to anyone with the link. Thanks. |
Hi @amye I have consulted @nicholasjackson and also gotten an update and demo from the KubeSlice team today in TAG-network meeting. We don't see any blocker for KubeSlide to be accepted as a CNCF incubation project. Both Nic and I found the project very interesting given our background of service mesh and networking, and have potential to integrate with various mesh products. Nic wrote a great explanation: KubeSlice is a tool for Kubernetes with optional Service Mesh integration that allows you to distribute and connect services in your application securely across multiple Kubernetes clusters. For example, there are two teams in your organization. Team Frontend and Team Backend, each team manages a number of services and each team operates their own Kubernetes cluster. Team Backend would like to expose an API service securely to Team Frontend without exposing any other elements of the cluster. KubeSlice enables this by creating a slice, which is a logical partition of an application; this slice can then be exposed to an external cluster securely via the Slice VPN Gateways that run on each cluster. Since KubeSlice creates a custom DNS entry for the slice, all Team Frontend needs to do to call the service is to address it via the service DNS. KubeSlice handles the traffic routing to the Slice Gateway and then to the second cluster. Not only does this work between two clusters on the same VPC or network, but you can also use it on networks, vpcs, and even clouds. One concern I have shared with the project is the lack of GitHub activities, there were a few months inactivity and no release towards 4Q 2023. The project maintainer mentioned they were working on a big feature thus skipped 1 release. |
Thank you @linsun and @nicholasjackson for a great feedback - Kubeslice team really appreciates it. |
You are more than welcome, we are really looking forward to helping drive KubeSlice forward |
Yep thank you @pnavali for presenting this twice to tag-network!! Great project! |
Existing project community files look fine. If you get into Sandbox, you'll want to think about creating project governance for Kubeslice. But it's not required for acceptance. |
@jberkus sure will do - thanks. |
@linsun - could I just clarify if we mean sandbox or incubation stage for the recommendation? |
This is a sandbox application, that's the path forward here. |
Correct, only for sandbox stage. |
Quick KubeSlice project update: Releases: Busy repo worker-operator pulse for March month: We have added additional community contributors (working on it) and are looking to get more participation/visibility with CNCF sandbox approval. Community development:
|
Looks like a useful feature that can set up multiple virtual network domains for different tenants or different types of workloads through slices. |
/vote-sandbox |
Vote created@castrojo has called for a vote on The members of the following teams have binding votes:
Non-binding votes are also appreciated as a sign of support! How to voteYou can cast your vote by reacting to
Please note that voting for multiple options is not allowed and those votes won't be counted. The vote will be open for |
/check-vote |
Vote statusSo far Summary
Binding votes (4)
|
User | Vote | Timestamp |
---|---|---|
kunal-kushwaha | In favor | 2024-04-09 20:43:49.0 +00:00:00 |
neutr0n420 | In favor | 2024-04-09 21:02:47.0 +00:00:00 |
jeevanjoseph | In favor | 2024-04-09 21:32:46.0 +00:00:00 |
williamcaban | In favor | 2024-04-09 22:28:03.0 +00:00:00 |
Rahul-D78 | In favor | 2024-04-10 1:42:22.0 +00:00:00 |
hanshal101 | In favor | 2024-04-10 1:53:20.0 +00:00:00 |
priyupadhyay | In favor | 2024-04-10 2:31:35.0 +00:00:00 |
KRANTHI0918 | In favor | 2024-04-10 3:37:10.0 +00:00:00 |
KRANTHI1430 | In favor | 2024-04-10 3:37:37.0 +00:00:00 |
narmidm | In favor | 2024-04-10 3:47:36.0 +00:00:00 |
PuranAdhikari | In favor | 2024-04-10 4:10:42.0 +00:00:00 |
cheera270 | In favor | 2024-04-10 4:46:51.0 +00:00:00 |
saikotireddy | In favor | 2024-04-10 4:51:53.0 +00:00:00 |
bharathbh | In favor | 2024-04-10 4:52:15.0 +00:00:00 |
rissh | In favor | 2024-04-10 4:58:34.0 +00:00:00 |
NishantSingh10 | In favor | 2024-04-10 5:51:15.0 +00:00:00 |
corneliu-calciu | In favor | 2024-04-10 5:56:58.0 +00:00:00 |
tanmoysrt | In favor | 2024-04-10 6:06:14.0 +00:00:00 |
Krishnapro | In favor | 2024-04-10 6:10:32.0 +00:00:00 |
toshalkhawale | In favor | 2024-04-10 6:13:31.0 +00:00:00 |
rohitBDeshmukh21 | In favor | 2024-04-10 6:15:22.0 +00:00:00 |
rahulii | In favor | 2024-04-10 6:23:52.0 +00:00:00 |
rohitutekar123 | In favor | 2024-04-10 6:25:35.0 +00:00:00 |
sksaec | In favor | 2024-04-10 6:59:20.0 +00:00:00 |
argadepp | In favor | 2024-04-10 7:26:46.0 +00:00:00 |
Vivekgaddigi | In favor | 2024-04-10 7:30:58.0 +00:00:00 |
Dheeraj-k8s | In favor | 2024-04-10 7:37:43.0 +00:00:00 |
sudhiratavesha | In favor | 2024-04-10 7:54:46.0 +00:00:00 |
Himan-Miku | In favor | 2024-04-10 7:57:28.0 +00:00:00 |
sachinzac | In favor | 2024-04-10 8:05:01.0 +00:00:00 |
yami-kami | In favor | 2024-04-10 8:59:10.0 +00:00:00 |
mridulgain | In favor | 2024-04-10 9:54:59.0 +00:00:00 |
testmail181202 | In favor | 2024-04-10 9:57:30.0 +00:00:00 |
veenamj-avesha | In favor | 2024-04-10 10:26:43.0 +00:00:00 |
samuelneagu | In favor | 2024-04-10 10:51:42.0 +00:00:00 |
uwagh | In favor | 2024-04-10 11:22:25.0 +00:00:00 |
saiyam1814 | In favor | 2024-04-10 13:02:11.0 +00:00:00 |
rajavesha | In favor | 2024-04-10 13:02:17.0 +00:00:00 |
/check-vote |
Vote statusSo far Summary
Binding votes (7)
|
User | Vote | Timestamp |
---|---|---|
kunal-kushwaha | In favor | 2024-04-09 20:43:49.0 +00:00:00 |
neutr0n420 | In favor | 2024-04-09 21:02:47.0 +00:00:00 |
jeevanjoseph | In favor | 2024-04-09 21:32:46.0 +00:00:00 |
williamcaban | In favor | 2024-04-09 22:28:03.0 +00:00:00 |
Rahul-D78 | In favor | 2024-04-10 1:42:22.0 +00:00:00 |
hanshal101 | In favor | 2024-04-10 1:53:20.0 +00:00:00 |
priyupadhyay | In favor | 2024-04-10 2:31:35.0 +00:00:00 |
KRANTHI0918 | In favor | 2024-04-10 3:37:10.0 +00:00:00 |
KRANTHI1430 | In favor | 2024-04-10 3:37:37.0 +00:00:00 |
narmidm | In favor | 2024-04-10 3:47:36.0 +00:00:00 |
PuranAdhikari | In favor | 2024-04-10 4:10:42.0 +00:00:00 |
cheera270 | In favor | 2024-04-10 4:46:51.0 +00:00:00 |
saikotireddy | In favor | 2024-04-10 4:51:53.0 +00:00:00 |
bharathbh | In favor | 2024-04-10 4:52:15.0 +00:00:00 |
rissh | In favor | 2024-04-10 4:58:34.0 +00:00:00 |
NishantSingh10 | In favor | 2024-04-10 5:51:15.0 +00:00:00 |
corneliu-calciu | In favor | 2024-04-10 5:56:58.0 +00:00:00 |
tanmoysrt | In favor | 2024-04-10 6:06:14.0 +00:00:00 |
Krishnapro | In favor | 2024-04-10 6:10:32.0 +00:00:00 |
toshalkhawale | In favor | 2024-04-10 6:13:31.0 +00:00:00 |
rohitBDeshmukh21 | In favor | 2024-04-10 6:15:22.0 +00:00:00 |
rahulii | In favor | 2024-04-10 6:23:52.0 +00:00:00 |
rohitutekar123 | In favor | 2024-04-10 6:25:35.0 +00:00:00 |
sksaec | In favor | 2024-04-10 6:59:20.0 +00:00:00 |
Vivekgaddigi | In favor | 2024-04-10 7:30:58.0 +00:00:00 |
Dheeraj-k8s | In favor | 2024-04-10 7:37:43.0 +00:00:00 |
sudhiratavesha | In favor | 2024-04-10 7:54:46.0 +00:00:00 |
Himan-Miku | In favor | 2024-04-10 7:57:28.0 +00:00:00 |
sachinzac | In favor | 2024-04-10 8:05:01.0 +00:00:00 |
yami-kami | In favor | 2024-04-10 8:59:10.0 +00:00:00 |
mridulgain | In favor | 2024-04-10 9:54:59.0 +00:00:00 |
testmail181202 | In favor | 2024-04-10 9:57:30.0 +00:00:00 |
veenamj-avesha | In favor | 2024-04-10 10:26:43.0 +00:00:00 |
samuelneagu | In favor | 2024-04-10 10:51:42.0 +00:00:00 |
uwagh | In favor | 2024-04-10 11:22:25.0 +00:00:00 |
saiyam1814 | In favor | 2024-04-10 13:02:11.0 +00:00:00 |
rajavesha | In favor | 2024-04-10 13:02:17.0 +00:00:00 |
gourishbiradar | In favor | 2024-04-10 13:37:58.0 +00:00:00 |
d7r-s4a-01 | In favor | 2024-04-10 14:23:50.0 +00:00:00 |
that-backend-guy | In favor | 2024-04-10 14:24:30.0 +00:00:00 |
argadepp | In favor | 2024-04-10 15:13:00.0 +00:00:00 |
nicholasjackson | In favor | 2024-04-10 15:34:21.0 +00:00:00 |
wmariuss | In favor | 2024-04-10 16:10:38.0 +00:00:00 |
Naveen-Reddi | In favor | 2024-04-10 16:26:42.0 +00:00:00 |
KRANTHI1403 | In favor | 2024-04-10 16:32:52.0 +00:00:00 |
Hithesh-16 | In favor | 2024-04-10 16:52:36.0 +00:00:00 |
joerober | In favor | 2024-04-10 17:05:59.0 +00:00:00 |
rutu-k | In favor | 2024-04-10 17:32:29.0 +00:00:00 |
vvmadduri | In favor | 2024-04-10 17:39:30.0 +00:00:00 |
swghosh | In favor | 2024-04-10 19:05:44.0 +00:00:00 |
frankpaolino | In favor | 2024-04-11 3:30:35.0 +00:00:00 |
Manikanta-StickSecure | In favor | 2024-04-11 4:45:51.0 +00:00:00 |
FireAnt121 | In favor | 2024-04-11 13:08:22.0 +00:00:00 |
/check-vote |
Votes can only be checked once a day. |
Vote closedThe vote passed! 🎉
Summary
Binding votes (9)
|
User | Vote | Timestamp |
---|---|---|
@kunal-kushwaha | In favor | 2024-04-09 20:43:49.0 +00:00:00 |
@neutr0n420 | In favor | 2024-04-09 21:02:47.0 +00:00:00 |
@jeevanjoseph | In favor | 2024-04-09 21:32:46.0 +00:00:00 |
@williamcaban | In favor | 2024-04-09 22:28:03.0 +00:00:00 |
@Rahul-D78 | In favor | 2024-04-10 1:42:22.0 +00:00:00 |
@hanshal101 | In favor | 2024-04-10 1:53:20.0 +00:00:00 |
@priyupadhyay | In favor | 2024-04-10 2:31:35.0 +00:00:00 |
@KRANTHI0918 | In favor | 2024-04-10 3:37:10.0 +00:00:00 |
@KRANTHI1430 | In favor | 2024-04-10 3:37:37.0 +00:00:00 |
@narmidm | In favor | 2024-04-10 3:47:36.0 +00:00:00 |
@PuranAdhikari | In favor | 2024-04-10 4:10:42.0 +00:00:00 |
@cheera270 | In favor | 2024-04-10 4:46:51.0 +00:00:00 |
@saikotireddy | In favor | 2024-04-10 4:51:53.0 +00:00:00 |
@bharathbh | In favor | 2024-04-10 4:52:15.0 +00:00:00 |
@rissh | In favor | 2024-04-10 4:58:34.0 +00:00:00 |
@NishantSingh10 | In favor | 2024-04-10 5:51:15.0 +00:00:00 |
@corneliu-calciu | In favor | 2024-04-10 5:56:58.0 +00:00:00 |
@tanmoysrt | In favor | 2024-04-10 6:06:14.0 +00:00:00 |
@Krishnapro | In favor | 2024-04-10 6:10:32.0 +00:00:00 |
@toshalkhawale | In favor | 2024-04-10 6:13:31.0 +00:00:00 |
@rohitBDeshmukh21 | In favor | 2024-04-10 6:15:22.0 +00:00:00 |
@rahulii | In favor | 2024-04-10 6:23:52.0 +00:00:00 |
@rohitutekar123 | In favor | 2024-04-10 6:25:35.0 +00:00:00 |
@sksaec | In favor | 2024-04-10 6:59:20.0 +00:00:00 |
@Vivekgaddigi | In favor | 2024-04-10 7:30:58.0 +00:00:00 |
@sudhiratavesha | In favor | 2024-04-10 7:54:46.0 +00:00:00 |
@Himan-Miku | In favor | 2024-04-10 7:57:28.0 +00:00:00 |
@sachinzac | In favor | 2024-04-10 8:05:01.0 +00:00:00 |
@yami-kami | In favor | 2024-04-10 8:59:10.0 +00:00:00 |
@mridulgain | In favor | 2024-04-10 9:54:59.0 +00:00:00 |
@testmail181202 | In favor | 2024-04-10 9:57:30.0 +00:00:00 |
@veenamj-avesha | In favor | 2024-04-10 10:26:43.0 +00:00:00 |
@samuelneagu | In favor | 2024-04-10 10:51:42.0 +00:00:00 |
@uwagh | In favor | 2024-04-10 11:22:25.0 +00:00:00 |
@saiyam1814 | In favor | 2024-04-10 13:02:11.0 +00:00:00 |
@rajavesha | In favor | 2024-04-10 13:02:17.0 +00:00:00 |
@gourishbiradar | In favor | 2024-04-10 13:37:58.0 +00:00:00 |
@d7r-s4a-01 | In favor | 2024-04-10 14:23:50.0 +00:00:00 |
@that-backend-guy | In favor | 2024-04-10 14:24:30.0 +00:00:00 |
@argadepp | In favor | 2024-04-10 15:13:00.0 +00:00:00 |
@nicholasjackson | In favor | 2024-04-10 15:34:21.0 +00:00:00 |
@wmariuss | In favor | 2024-04-10 16:10:38.0 +00:00:00 |
@Naveen-Reddi | In favor | 2024-04-10 16:26:42.0 +00:00:00 |
@KRANTHI1403 | In favor | 2024-04-10 16:32:52.0 +00:00:00 |
@Hithesh-16 | In favor | 2024-04-10 16:52:36.0 +00:00:00 |
@joerober | In favor | 2024-04-10 17:05:59.0 +00:00:00 |
@rutu-k | In favor | 2024-04-10 17:32:29.0 +00:00:00 |
@vvmadduri | In favor | 2024-04-10 17:39:30.0 +00:00:00 |
@swghosh | In favor | 2024-04-10 19:05:44.0 +00:00:00 |
@frankpaolino | In favor | 2024-04-11 3:30:35.0 +00:00:00 |
@Manikanta-StickSecure | In favor | 2024-04-11 4:45:51.0 +00:00:00 |
@FireAnt121 | In favor | 2024-04-11 13:08:22.0 +00:00:00 |
@Dheeraj-k8s | In favor | 2024-04-11 19:27:18.0 +00:00:00 |
@katragadda | In favor | 2024-04-11 20:21:34.0 +00:00:00 |
@bhood4 | In favor | 2024-04-12 0:37:24.0 +00:00:00 |
@skrantz2000 | In favor | 2024-04-12 7:02:01.0 +00:00:00 |
With the onboarding issue open at: #190 Thanks! |
Application contact emails
[email protected], [email protected], [email protected]
Project Summary
KubeSlice is a multi-cluster networking application for pod-to-pod communication across clusters.
Project Description
KubeSlice is an open-source project that simplifies multi-cluster networking for, multi-cloud, edge, cloud, hybrid-cloud and bare-metal Kubernetes clusters. It is a vendor-neutral extensible framework to build flat overlay networks across heterogeneous Kubernetes clusters. It enables and simplifies pod-to-pod communications for L3-L7 protocols across a fleet of clusters by using a construct called ‘Slice’. Each Slice can be associated with a set of clusters with varying topologies and can be associated with one or more namespaces in each cluster. The pods in the Slice namespaces can reach each other over the Slice specific flat overlay network. KubeSlice allows creating multiple Slices across clusters with each slice having a dedicated set of namespaces in each associated cluster. It enables easy segmentation and isolation of applications using slices. It allows namespace -sameness across the associated clusters in a slice. KubeSlice brings with it software-defined, highly-available and secure connections across clusters using VPN gateways. KubeSlice enables service discovery across the Slice using Service Exports and Imports in each cluster. A Slice associated namespace service running on a cluster can be exported and made available to all the other clusters namespaces associated with the Slice. SliceDNS in each cluster can be used for FQDN based inter-cluster service-service communications across the Slice. Slice DNS has service entries with overlay network IP addresses for service endpoints.
Slice flat overlay network is CNI agnostic, and it does not require non-conflicting pod subnets on the associated clusters.
KubeSlice integrates with service meshes like Istio to deploy slice Ingress/Egress gateways for east-west traffic across multi-cluster Istio deployments, by automating the creation of gateways and virtual services for cross cluster distribution of workloads.
This architectural prowess is vital for distributed applications across clusters, fostering data consistency, availability, and performance.
KubeSlice offers a unified service connectivity layer that enables easy segmentation and
isolation of applications across multiple Kubernetes clusters. KubeSlice multi-cluster Kubernetes networking removes complexities of building and managing a service connectivity layer across multiple clusters. It further enables distributed application fabric through seamless data access and management. Users can craft data placement policies based on latency and data sovereignty and replicate data in optimal regions or clusters.
Org repo URL (provide if all repos under the org are in scope of the application)
https://github.com/kubeslice
Project repo URL in scope of application
https://github.com/kubeslice/kubeslice
Additional repos in scope of the application
https://github.com/orgs/kubeslice/repositories has all the related repos.
Website URL
https://kubeslice.io/
Roadmap
https://github.com/orgs/kubeslice/projects/4
Roadmap context
In our office hours and CNCF community channels, we openly discuss the Roadmap, gathering input and prioritizing items through collaborative discussions. Our approach is strongly oriented towards fostering a thriving ecosystem, and we actively seek opportunities for interoperability with CNCF projects and other open-source initiatives. This commitment helps us better address the interests and needs of our community.
Contributing Guide
://github.com/kubeslice/worker-httpsoperator/blob/master/CONTRIBUTING.md
Code of Conduct (CoC)
https://github.com/kubeslice/worker-operator/blob/master/code_of_conduct.md
Adopters
No response
Contributing or Sponsoring Org
https://avesha.io/
Maintainers file
https://github.com/kubeslice/worker-operator/blob/master/MAINTAINERS.md
IP Policy
Trademark and accounts
Why CNCF?
By joining CNCF, we want to motivate more innovation and participation from the open-source community. Some significant values joining CNCF could bring to the project are:
Be vendor-neutral: KubeSlice can get a neutral home in CNCF, to facilitate further project development through a more diverse and neutral community.
Be more aware: leverage CNCF to promote the project and get more users and contributors through official events, mailing lists, blog posts, etc.
We also believe that KubeSlice could be an excellent addition to the existing CNCF landscape. KubeSlice is based on Kubernetes, and it is a significant attempt to tackle the challenges with applications specific multi-cluster networking across a fleet of clusters.
Benefit to the Landscape
As organizations move towards adopting or extending the use of Kubernetes clusters for their applications, they would inevitably have to deal with the complexities of building and managing a unified service connectivity layer for easy segmentation and isolation of applications across multiple clusters.
KubeSlice addresses these challenges by providing an extensible framework for creating and managing Slices where each Slice has its own flat overlay network and namespace associations for easy segmentation and isolation of applications across multiple clusters.
Each pod in a Slice overlay network spanning across multiple clusters is uniquely addressable at L3. Hence, a pod talking to another pod in a remote cluster is oblivious of its location and would communicate with it as though it were running on the same cluster. Since the connectivity between pods is at L3, there is no need to provision L7 ingress/egress application gateways between clusters to enable pod-to-service or service-to-service communication. It also facilitates Service Discovery across the set of clusters by automatically exporting and importing service endpoints.
KubeSlice not only enables applications that are based on L7 protocols, it also enables applications that are purely based on L4 protocols (TCP or UDP) to utilize multi-cluster topologies. KubeSlice does not have any restrictions on the CNI being used on the clusters. It is interoperable with any CNI, and it does not require the pod CIDR on the connecting clusters to be non-conflicting.
We believe KubeSlice would be a valuable addition to the CNCF landscape as the community navigates through the challenges of connecting applications across multiple clusters.
Cloud Native 'Fit'
KubeSlice is built as an extension to Kubernetes with Operators/Controllers and API extensions to build and manage Slices for applications connectivity across clusters. The Slice overlay network is built with cloud native network functions (CNFs). The state-based-management of Slices dramatically simplifies the multi-cluster connectivity orchestration and management, and improves the compatibility, scalability and configuration management of multi-cluster networking across heterogeneous Kubernetes clusters in edge, bare-metal or private/public cloud locations.
Cloud Native 'Integration'
KubeSlice uses CNCF sandbox project Network Service Mesh (NSM) for some of the Slice overlay network functions.
Cloud Native Overlap
N/A
Similar projects
N/A
Landscape
No
Business Product or Service to Project separation
Avesha’s KubeSlice enterprise product uses KubeSlice open-source as core, but the open source project roadmap and direction is driven by the needs of the community. This will continue to be true in the future. Avesha provides implementation & product enhancement services for enterprises which deviate from core open-source solutions.
Project presentations
No response
Project champions
No response
Additional information
No response
The text was updated successfully, but these errors were encountered: