Application Protocol Selection
OSM is capable of routing different application protocols such as HTTP
, TCP
, and gRPC
differently. The following guide describes how to configure service ports to specify the application protocol to use for traffic filtering and routing.
Configuring the application protocol
Kubernetes services expose one or more ports. A port exposed by an application running the service can serve a specific application protocol such as HTTP, TCP, gRPC etc. Since OSM filters and routes traffic for different application protocols differently, a configuration on the Kubernetes service object is necessary to convey to OSM how traffic directed to a service port must be routed.
In order to determine the application protocol served by a service’s port, OSM expects the AppProtocol
field on the service object to be set, or have the port name prefixed with the application protocol name.
OSM supports the following application protocols for service ports:
http
: For HTTP based filtering and routing of traffictcp
: For TCP based filtering and routing of trafficgRPC
: For HTTP2 based filtering and routing of gRPC traffic
The AppProtocol
field can be specified in Kubernetes server versions >= v1.19. In older versions where this field cannot be set, the application protocol for a service port can be indicated by prefixing the protocol name as a part of the port name. If the application protocol cannot be derived, OSM controller will use http
as the default application protocol for a port.
Note: The
AppProtocol
field takes precedence over theName
field if both are specified.
The application protocol configuration described is applicable to both SMI and Permissive traffic policy modes.
Examples
Consider the following SMI traffic access and traffic specs policies:
- A
TCPRoute
resource namedtcp-route
that specifies the port TCP traffic should be allowed on. - An
HTTPRouteGroup
resource namedhttp-route
that specifies the HTTP routes for which HTTP traffic should be allowed. - A
TrafficTarget
resource namedtest
that allows pods in the service accountsa-2
to access pods in the service accountsa-1
for the speficied TCP and HTTP rules.
kind: TCPRoute
metadata:
name: tcp-route
spec:
matches:
ports:
- 8080
---
kind: HTTPRouteGroup
metadata:
name: http-route
spec:
matches:
- name: version
pathRegex: "/version"
methods:
- GET
---
kind: TrafficTarget
metadata:
name: test
namespace: default
spec:
destination:
kind: ServiceAccount
name: sa-1 # There are 2 services under this service account: service-1 and service-2
namespace: default
rules:
- kind: TCPRoute
name: tcp-route
- kind: HTTPRouteGroup
name: http-route
sources:
- kind: ServiceAccount
name: sa-2
namespace: default
Kubernetes service resources should explicitly specify the application protocol being served by the service’s ports using the appProtocol
field.
A service service-1
backed by a pod in service account sa-1
serving http
application traffic should be defined as follows:
kind: Service
metadata:
name: service-1
namespace: default
spec:
ports:
- port: 8080
name: some-port
appProtocol: http
A service service-2
backed by a pod in service account sa-1
serving raw tcp
application traffic shold be defined as follows:
kind: Service
metadata:
name: service-2
namespace: default
spec:
ports:
- port: 8080
name: some-port
appProtocol: tcp
If the cluster is using an older Kubernetes version where appProtocol
cannot be specified in the Service spec, the application protocol can be indicated by prefixing the port name with the protocol as follows:
kind: Service
metadata:
name: service-3
namespace: default
spec:
ports:
- port: 80
name: http-someport # prefix 'http-' indicates http application protocol
- port: 90
name: tcp-someport # prefix 'tcp-' indicates tcp application protocol
Feedback
Was this page helpful?
Glad to hear it! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.