Skip to content

Conversation

zac-nixon
Copy link
Collaborator

@zac-nixon zac-nixon commented Sep 25, 2025

Description

Adds in L7 documentation, that details the basic flow (style taken from L4 documentation). Also provides details on how to use the newly introduced ListenerRuleConfiguration.

  • Fix warnings presented by make docs-preview
  • Add LRC documentation
  • Added table that compares LBC support, to gateway feature set.
  • Added ALB documentation

Checklist

  • Added tests that cover your change (if possible)
  • Added/modified documentation as required (such as the README.md, or the docs directory)
  • Manually tested
  • Made sure the title of the PR is a good description that can go into the release notes

BONUS POINTS checklist: complete for good vibes and maybe prizes?! 🤯

  • Backfilled missing tests for code in same general area 🎉
  • Refactored something and made the world a better place 🌟

@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: zac-nixon

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added the cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. label Sep 25, 2025
@k8s-ci-robot k8s-ci-robot added approved Indicates a PR has been approved by an approver from all required OWNERS files. size/XL Denotes a PR that changes 500-999 lines, ignoring generated files. labels Sep 25, 2025
@k8s-ci-robot
Copy link
Contributor

@zac-nixon: The following test failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
pull-aws-load-balancer-controller-e2e-test 07771eb link true /test pull-aws-load-balancer-controller-e2e-test

Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

onUnauthenticatedRequest: "authenticate/deny/allow"
```
**Important** When specifying the secret, the secret name must exist within the namespace of the ListenerRuleConfiguration.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Lets also add the link on how to configure RBAC on secrets customer wishes to use so that they can find this.
https://kubernetes-sigs.github.io/aws-load-balancer-controller/v2.13/examples/secrets_access/

* **L7 Listener Materialization:** The controller processes the `my-http-app-route` resource. Given that the `HTTPRoute` validly references the `my-alb-gateway` and its `http` and `https` listeners, two **Listeners** are materialized on the ALB. The listeners accept HTTP traffic on port 80 and HTTPS traffic on port 443 and forward them to the service hosted on the HTTPRoute.
* **Target Group Creation:** An **AWS Target Group** is created that contains the cluster nodes with the configured NodePort of the service.

#### Feature Comparison: ALB Gateways vs. Standard Gateway API
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for this. This is fantastic.

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

wow those charts are really good

| HTTPRouteRule - HTTPRouteMatch - HTTPQueryParamMatch | Core | ✅ |
| HTTPRouteRule - HTTPRouteMatch - HTTPMethod | Core | ✅ |
| HTTPRouteRule - HTTPRouteFilter - Type | Core | ❌ -- Partial support |
| HTTPRouteRule - HTTPRouteFilter - RequestHeaderModifier | Core | ❌-- [Limited Support](https://docs.aws.amazon.com/elasticloadbalancing/latest/application/header-modification.html) |
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should we explain this partial support more by providing the examples?


For a comprehensive overview of the CRD, please refer to the [ListenerRuleConfiguration CRD documentation](./listenerruleconfig.md).

**Example: Adding source IP routing conditions**
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

we provide them with more flexibility here with matchIndexes

  • if user does not specify matchIndexes, this source ip will be applied to all listener rules within same match
  rules:
    - backendRefs:
        - name: echoserver2
          port: 80
      filters:
        - type: ExtensionRef
          extensionRef:
            group: "gateway.k8s.aws"
            kind: "ListenerRuleConfiguration"
            name: "custom-rule-config-source-ip"
      matches:
        - path: # Path Pattern
            type: Exact
            value: /pathExactMatch
          queryParams: # Query String
            - name: "user"
              value: "john"
          method: GET # HTTP Request Method
        - path: # Regex path match
            type: RegularExpression
            value: "/firstRule/some?/users"

for example, here will have 2 rules, and source ip will be applied to all of them

* **`TargetGroupConfiguration` (LBC CRD)**: A Custom Resource Definition used for service-specific customizations of AWS Target Groups. This CRD is associated with a Kubernetes `Service`. For more info, please refer [How customization works](../customization)
* **`ReferenceGrant`**: Defines cross-namespace access. For more information [see](https://gateway-api.sigs.k8s.io/api-types/referencegrant/)
* **`LoadBalancerConfiguration` (LBC CRD)**: A Custom Resource Definition utilized for fine-grained customization of the provisioned NLB. This CRD can be attached to a `Gateway` or its `GatewayClass`. For more info, please refer [How customization works](customization.md#customizing-the-gateway-load-balancer-using-loadbalancerconfiguration-crd)
* **`TargetGroupConfiguration` (LBC CRD)**: A Custom Resource Definition used for service-specific customizations of AWS Target Groups. This CRD is associated with a Kubernetes `Service`. For more info, please refer [How customization works](customization.md#customizing-services-target-groups-using-targetgroupconfiguration-crd)
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

i forgot did we explicitly check/validate rule CRD cannot be used in L4?

- 10.0.0.0/5
```
Adds Source IP conditions into the routing rules. For granular control of which rules to apply the LRC to, use the matchIndex field.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ah i saw it here, but maybe we can just provide example above.

@@ -0,0 +1,202 @@
# Gateway API for Layer 7 (ALB) Implementation
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

i feel like did not see any mention about multi-header support with comma? i had example here in PR #4321

## Controller command line flags
!!!warning ""
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

did we cover default behavior change somewhere?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. size/XL Denotes a PR that changes 500-999 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants