-
Notifications
You must be signed in to change notification settings - Fork 23
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Sandbox] Kuadrant #80
Comments
TAG-CS Check:
|
Follow-up from today's sandbox review, Kuadrant will be moved to a vote 👍 |
Vote created@mrbobbytables has called for a vote on The members of the following teams have binding votes:
Non-binding votes are also appreciated as a sign of support! How to voteYou can cast your vote by reacting to
Please note that voting for multiple options is not allowed and those votes won't be counted. The vote will be open for |
/check-vote |
Vote statusSo far Summary
Binding votes (1)
|
User | Vote | Timestamp |
---|---|---|
nicholasjackson | In favor | 2024-06-13 16:36:11.0 +00:00:00 |
ZackButcher | In favor | 2024-06-13 17:01:07.0 +00:00:00 |
tssurya | In favor | 2024-06-13 17:01:28.0 +00:00:00 |
dlaw4608 | In favor | 2024-06-14 11:27:10.0 +00:00:00 |
I will be abstaining due to a conflict of interest. |
So, looking at docs under installation, there's only one option searching the code base for openshift doesn't help the case :( https://github.com/search?q=org%3AKuadrant%20openshift&type=code Is the team open to being distro agnostic? |
@dims While there is an openshift install guide, the main walkthroughs[1] and getting started guides[2] are based on the use of Kind clusters. We are and will continue to be distro agnostic. [1] https://docs.kuadrant.io/0.7.0/kuadrant-operator/doc/user-guides/secure-protect-connect/ |
@pmccarthy thanks for confirming that you are open to it. I was also looking at:
and was wondering if someone can fully participate in all aspects of working in Kuadrant community without needing to learn/install/understand openshift. given the |
@dims thank you for pointing out the documentation in our test suite - this was an oversight in our docs and has since been addressed to state that a Kubernetes cluster is required to run our test suite (not Openshift). It can be run on Kind clusters as an example. To answer your question, yes anyone can fully participate in the Kuadrant project without the need to use, learn or understand Openshift. You are correct that as of right now all project maintainers work for Red Hat - this is something we want to change by building out a community for the project to encourage other external contributors from other organisations to get involved in what we're doing. For us, acceptance to the CNCF is an important milestone to help us to achieve this goal. Also just a note on my previous comment above, the wording was a little misleading and so I've edited the above to state that we are and will continue to be distro agnostic. |
@pmccarthy thanks for the quick response! |
/check-vote |
Vote statusSo far Summary
Binding votes (8)
|
User | Vote | Timestamp |
---|---|---|
nicholasjackson | In favor | 2024-06-13 16:36:11.0 +00:00:00 |
ZackButcher | In favor | 2024-06-13 17:01:07.0 +00:00:00 |
tssurya | In favor | 2024-06-13 17:01:28.0 +00:00:00 |
dlaw4608 | In favor | 2024-06-14 11:27:10.0 +00:00:00 |
Vote closedThe vote passed! 🎉
Summary
Binding votes (10)
|
User | Vote | Timestamp |
---|---|---|
@nicholasjackson | In favor | 2024-06-13 16:36:11.0 +00:00:00 |
@ZackButcher | In favor | 2024-06-13 17:01:07.0 +00:00:00 |
@tssurya | In favor | 2024-06-13 17:01:28.0 +00:00:00 |
@dlaw4608 | In favor | 2024-06-14 11:27:10.0 +00:00:00 |
@mrbobbytables - apologies for the direct ping, I'm not sure who to reach out to with this question. I'm wondering what the next steps are in terms of onboarding now that we have the required number of binding votes? Is there anything needed on the Kuadrant side to help progress things? Any help/guidance would be greatly appreciated. Thanks |
@pmccarthy next week the donation tracking issues will be opened. We're updating the items to hopefully make the process a bit easier. |
@mrbobbytables sounds great, thank you for the update |
Hello and congrats on being accepted as a CNCF Sandbox project! Here is the link to your onboarding task list: #187 Feel free to reach out with any questions you might have! |
Application contact emails
Paul McCarthy [email protected], Thomas Maas [email protected]
Project Summary
Gateway Policies for Kubernetes leveraging the Gateway API standard
Project Description
Kuadrant is a set of Kubernetes-native controllers, services and APIs that provide gateway policies for existing Gateway API providers on both single and multi-cluster environments. It builds on top of Kubernetes Gateway API and technologies such as Istio and Envoy to introduce provider-agnostic Gateway Policies for Kubernetes.
The project provides the ability to connect ingress gateways upwards with Cloud DNS and Load Balancing providers, to set policies inwards with TLS and advanced (L7) service protection such as Auth and Rate limiting and to propagate desired gateway configurations downwards across multi-cluster environments.
A high level introduction to the project is available through a short video published on the projects YouTube channel, see https://www.youtube.com/watch?v=euWAMvQojP4
Org repo URL (provide if all repos under the org are in scope of the application)
https://github.com/Kuadrant
Project repo URL in scope of application
N/A
Additional repos in scope of the application
N/A
Website URL
https://kuadrant.io/
Roadmap
https://github.com/orgs/Kuadrant/projects/18
Roadmap context
Roadmap items are tracked via a Github projects board as linked above. Current items include:
Further information on each of the above can be found in their respective Github issues listed from the project board: https://github.com/orgs/Kuadrant/projects/18
Contributing Guide
https://kuadrant.io/contributing/
Code of Conduct (CoC)
https://github.com/Kuadrant/governance/blob/main/CODE_OF_CONDUCT.md
Adopters
https://github.com/Kuadrant/authorino/blob/main/ADOPTERS.md, https://github.com/Kuadrant/limitador/blob/main/ADOPTERS.md, https://github.com/Kuadrant/dns-operator/blob/main/ADOPTERS.md
Contributing or Sponsoring Org
Red Hat: https://www.redhat.com
Maintainers file
https://github.com/Kuadrant/authorino/blob/main/MAINTAINERS.md, https://github.com/Kuadrant/limitador/blob/main/MAINTAINERS.md
https://github.com/Kuadrant/dns-operator/blob/main/MAINTAINERS.md
IP Policy
Trademark and accounts
Why CNCF?
As the Kuadrant team is focused on building out a community for this project, we see the CNCF as an ideal platform for helping to gain wider visibility to support the goal of increasing community engagement and project adoption. The CNCF (in our view) will help bring the project closer to the cloud-native community, providing the opportunity to collaborate with like-minded developers and users. We feel that greater exposure of the project will lead to increased feedback and validation that what we are offering is being delivered in the most effective manner. Finally, should we be successful in our efforts to build a community, a strong governance model will also be required which we hope the CNCF can help with.
Benefit to the Landscape
The Kuadrant project provides communities and enterprises with a solution for managing and enforcing Kubernetes Gateway policies across single and multi-cluster environments. As it’s based on the Gateway API standard and leverages the policy attachment pattern, it could be viewed as an example project for the implementation of this pattern. Furthermore, it also compliments existing CNCF projects such as Istio: expanding on their Gateway API implementation to provide a set of policies to further enrich the user experience; and Submariner: providing service resiliency across multiple clusters (see POC Walkthrough).
Cloud Native 'Fit'
As per other answers provided in this application, Kuadrant is a kube-native set of controllers, services and APIs that provides policy management and enforcement to Gateway API providers. Given its close ties to Kubernetes and other projects as mentioned in the Cloud Native Integration section below, we feel that the project is directly tied to the Cloud Native landscape.
Cloud Native 'Integration'
Aside from being a kube-native offering, the Kuadrant project complements other existing CNCF projects such as Istio: expanding on their Gateway API implementation to provide a set of policies to further enrich the user experience; and Submariner: providing service resiliency across multiple clusters (see POC Walkthrough).
Cloud Native Overlap
Kuadrant overlaps with the Kubernetes, Istio, Envoy and Submariner projects. See Cloud Native Integration section above for further details
Similar projects
N/A
Landscape
Not at this time
Business Product or Service to Project separation
N/A
Project presentations
The project was recently presented to the TAG App Delivery group[1] (Jan 17th 2024), the Kubernetes SIG-Network Gateway API group[2] (Feb 6th 2024) and is scheduled to be presented on the next TAG Network meeting on June 13th 2024. It was also showcased during the CNCF Barcelona Meetup back in November 2023[3], see recordings below:
[1] https://www.youtube.com/watch?v=TzE2sIZ3qeU
[2] https://www.youtube.com/watch?v=LPJa92TEA0k
[3] https://www.youtube.com/watch?v=CT80VFV21fc
Project champions
Karena Angell: TAG App Delivery
Additional information
No response
The text was updated successfully, but these errors were encountered: