-
Notifications
You must be signed in to change notification settings - Fork 2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support local_bind_address for Conusl Connect upstreams #6248
Comments
+1 for this issue |
@schmichael can you explain the need for this feature? This implies that there will be other sources that would be allowed access into the upstream apart from the tasks running in the network namespace. Which would mean needing to open up the |
@djenriquez Indeed, allowing binding upstreams to You could use this to implement an "ingress" style jobs which use Envoy to proxy untrusted external traffic to Connect-enabled services. For example if there was an The I'm not even sure It's a topic of active discussion internally but any feedback is welcome (either on this wacky "ingress" use case or other |
https://www.consul.io/docs/agent/config-entries/ingress-gateway |
I'm going to lock this issue because it has been closed for 120 days ⏳. This helps our maintainers find and focus on the active issues. |
Support
local_bind_address
for Consul Connect upstreams:Since IPs may vary by host, I think
0.0.0.0
and127.0.0.1
are the only two options that make sense. We may just want to bind to0.0.0.0
in network namespaces by default.The text was updated successfully, but these errors were encountered: