-
Notifications
You must be signed in to change notification settings - Fork 405
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Enable VPC peering for Kyma clusters #18197
Comments
This issue or PR has been automatically marked as stale due to the lack of recent activity. This bot triages issues and PRs according to the following rules:
You can:
If you think that I work incorrectly, kindly raise an issue with the problem. /lifecycle stale |
The prototype has been started. Two repositories are created in kyma-project:
|
For the sake of simplicity, we have moved all code to one repo. You can find all the code in the cloud-resources-manager repo now. https://github.com/kyma-project/cloud-resources-manager - control plane, runtime operator |
This issue has been automatically marked as stale due to the lack of recent activity. It will soon be closed if no further activity occurs. |
This issue has been automatically marked as stale due to the lack of recent activity. It will soon be closed if no further activity occurs. |
Status update VPC Peering is under development. We have a working MVP for VPC Peering on GCP. It's a happy path, but the "create" VPC Peering flow is working. We will finish VPC Peering creation for Azure soon, with AWS right after. More info will arrive soon. |
This issue has been automatically marked as stale due to the lack of recent activity. It will soon be closed if no further activity occurs. |
Status update: Development is done (mostly); we are in communication with the SRE team to add proper principals for every Cloud Provider. |
Dev is done, currently, this is being tested, and in a few days will be pushed to the stage. |
Hello @ngrkajac The planned Due-day was end of September. Is there any new update. Thx a lot. |
VPC Peering features are already developed, deployed, and enabled for some customers. The feature will soon be enabled on the Prod landscape within the official release. |
Description
Provide a way for end users to establish secure internal connectivity to other networks on the same hyperscaler via VPC peering.
Context
Problem
Currently, Kyma is a layer on top of Kubernetes and as such provides a very limited set of infrastructure configuration options at provisioning time.
However, customers looking to adopt Kyma that already use existing hyperscaler offerings already take advantage of more advanced networking capabilities in order to establish secure internal connectivity to other workloads.
Without such connectivity in Kyma, customers would require a much higher effort and increased risk tolerance in order to migrate or extend their existing workloads on Kyma.
Benefits
For customers:
For us:
Potential problems
Acceptance criteria
The text was updated successfully, but these errors were encountered: