GEP-2722: Goals and UX for gwctl
- Issue: #2722
- Status: Memorandum
TLDR
TLDR: This GEP proposes gwctl
, a new command line tool designed to streamline the experience of working with Gateway API resources. It offers a familiar kubectl-like interface for viewing resources while providing more detailed and informative output that is specifically focused on the Gateway API. For advanced filtering and other in-depth features, gwctl
can be effectively used alongside kubectl
.
Motivations
- Limited kubectl customizability for CRDs:
- kubectl’s customization capabilities for CRDs (through
additionalPrinterColumns
) is constrained, limiting the ability to create optimal views for Gateway API resources.
- kubectl’s customization capabilities for CRDs (through
- Complex policy attachment management:
- As described in GEP-713, policies present a valuable mechanism for expanding the capabilities of Gateway API resources. However, discoverability poses a challenge due to the absence of a clear connection between resources and their associated policies. There have been growing questions around suitability of policies as a means to provide extensions.
- Challenging multi-resource model navigation:
- Comprehending the relationships between multiple Gateway API resources can be challenging within kubectl.
Goals
- Greater control over output formatting and presentation:
- Offer greater control over output formatting and presentation, enhancing visibility and understanding of Gateway API resources.
- Improved policy discoverability, increasing adoption and usability:
- Make policies easily discoverable, aiding in the adoption and fostering broader acceptance of policies as an extension mechanism.
- Simplified multi-resource model navigation:
- Facilitate navigation of the multi-resource model by making connections between Gateway API resources explicit, aiding in configuration, troubleshooting, and issue identification.
- Proactive error detection and reporting:
- Leverage native understanding of resource relationships to proactively detect and report on potential configuration errors, further simplifying issue identification and resolution. This would complement the ability of users to readily pinpoint configuration problems themselves.
- Provide incentive for policy implementations that are consistent across cloud providers:
- Encourage the adoption of consistent policy implementations across different Gateway API providers, promoting interoperability and predictability.
Commands Specification
Milestone 1
Supported Commands:
- get: Retrieves information about specified resources without including additional information from related resources.
- describe: Provides detailed information about specified resources, including augmented information from related resources.
Supported Resources:
- gatewayclass
- gateways
- httproutes
- namespaces
- backends (not a native k8s resource)
- policycrds (not a native k8s resource)
- policies (not a native k8s resource)
Filtering Options:
-n
Namespace: Filters resources by namespace. Applicable to all resources except cluster-scoped resources.-l
Labels: Filters resources by labels. Applicable to all resources.-A
All Namespaces: Fetches resources across all namespaces (redundant for cluster-scoped resources).-t
Target Resource: Filters policies based on the target resource type they apply to. Applicable only to the policies resource.- Syntax:
-t <key1>=<value1>,<key2>=<value2>,...
- Supported keys:
- kind: Resource kind (e.g., “httproute”, “gateway”)
- namespace: Resource namespace
- name: Resource name
- group: Resource API group
- Syntax:
Output Formats:
describe: Fixed format, not customizable. Shows comprehensive resource information with details from related resources.
get:
- One-line format (default): Displays basic resource information in a single line.
- YAML format (-o yaml): Presents resource information in the YAML data format.
- JSON format (-o json): Presents resource information in the JSON data format.
- Wide format (-o wide): Includes additional columns beyond those displayed in the one-line format.
Output columns while using get
Resource | Output Columns | Description | Visibility (Defaults to always unless specified otherwise) |
---|---|---|---|
gatewayclass | NAME | Name of the GatewayClass | |
CONTROLLER | Controller managing the GatewayClass | ||
ACCEPTED | Whether the GatewayClass is accepted by the controller | ||
AGE | Age of the GatewayClass | ||
GATEWAYS | Count of Gateways using this GatewayClass | -o wide | |
DESCRIPTION | Description from the GatewayClass | -o wide | |
gateway | NAME | Name of the Gateway | |
CLASS | Class of the Gateway | ||
ADDRESSES | Addresses of the Gateway (displayed using | ||
PORTS | Ports exposed by the Gateway | ||
PROGRAMMED | Whether the Gateway is programmed | ||
AGE | Age of the Gateway | ||
POLICIES | Count of policies affecting this Gateway | -o wide | |
HTTPROUTES | Count of HTTPRoutes that are attached to this Gateway | -o wide | |
httproute | NAMESPACE | Namespace of the HTTPRoute | |
NAME | Name of the HTTPRoute | ||
HOSTNAMES | Hostnames associated with the HTTPRoute | ||
PARENT REFS | Count of parent references of the HTTPRoute (e.g., Gateways) | ||
AGE | Age of the HTTPRoute | ||
POLICIES | Count of policies affecting this HTTPRoute | -o wide | |
namespace | NAME | Name of the namespace | |
STATUS | Status of the namespace | ||
AGE | Age of the namespace | ||
POLICIES | Count of policies affecting this Namespace | -o wide | |
backend | NAME | Name of the backend | |
TYPE | Type of the backend (currently only supports Services) | ||
REFERRED BY ROUTES | HTTPRoutes that refer to the backend (displayed using | ||
AGE | Age of the backend | ||
POLICIES | Count of policies affecting this Backend | -o wide | |
policycrd | NAME | Name of the Policy CRD in the form <kind.group> | |
POLICY TYPE | Type of policy defined by the CRD (Inherited or Direct) | ||
SCOPE | Scope of the policy (Namespaced or Cluster) | ||
POLICIES COUNT | Count of policy resources of this particular type. | -o wide | |
AGE | Age of the Policy CRD | ||
policy | NAME | Name of the policy | |
KIND | The kind of policy in the form <kind.group> | ||
TARGET NAME | Name of the resource the policy applies to | ||
TARGET KIND | The kind of target resource in the form | ||
POLICY TYPE | Type of policy (Inherited or Direct) | ||
AGE | Age of the Policy CRD |
Additional Notes:
- The behavior of
get
anddescribe
commands is similar to kubectl, withget
focusing on concise resource information anddescribe
providing comprehensive details. backends
represent resources that can be attached as backends to HTTPRoutes (currently limited to k8s services).policycrds
andpolicies
are not native k8s resources but represent subsets of CRDs and custom resource objects related to policies. (policycrds
are identified by PolicyLabelKey)
Examples of commands that should be supported:
gwctl get gateways -n foo
(Lists basic information about Gateways in the “foo” namespace)gwctl get httproutes -l version=v1,app=myapp
(Lists basic information about HTTPRoutes with the labels “version=v1” and “app=myapp”)gwctl get gateways -n foo -o yaml
(Shows detailed Gateway information in YAML format within the “foo” namespace)gwctl get httproutes -l version=v1,app=myapp -o json
(Shows detailed HTTPRoute information in JSON format with specified labels)gwctl describe gateways my-gateway
(Provides comprehensive details about the “my-gateway” Gateway, including information from related resources)gwctl describe policies my-policy
(Shows detailed information about the “my-policy” policy, encompassing data from relevant any related resources when applicable)gwctl get policies -t kind=httproute
(Lists basic information about policies that apply to HTTPRoutes)
Distribution
To ensure gwctl is widely accessible and easy to adopt, the following distribution mechanisms will be provided:
- Prebuilt Binaries: Prebuilt binaries for various platforms (Linux, macOS, Windows) will be made available for download. Tooling like GoReleaser can be used to streamline some of the build processes. Binaries will be offered in two variants:
gwctl
for standalone use.kubectl-gw
for use as a kubectl plugin (kubectl gw
).
- Kubectl Plugin Integration: gwctl will be integrated with Krew, the kubectl plugin manager. This should immensely help with improving discoverability of the plugin, allowing easier installation, and handling automatic updates for the user.
- Versioning: gwctl versions will be aligned with Gateway API releases (for the time when gwctl is developed within the same repository as Gateway API)
- As gwctl matures, the need for maintaining it within the primary Gateway API repository will be reassessed. Factors such as a potential divergence in release cadence, independent contributor growth or the desire to reduce the triage workload for Gateway API maintainers could motivate a move to a separate repository.
Future Milestones
- Each output of
describe
will include an extraAnalysis
field. This field will display any errors or other analysis information associated with the resource. - Investigate the feasibility and any advantages of using Graphviz or webview for visualizing data and presenting information in a visually appealing manner.
- Evaluate how gwctl can be extended to support Mesh use cases
References
Sample outputs
The example outputs provided below serve as a guideline for the implementation, outlining the range of values that may be presented:
gwctl get gatewayclass -o wide
NAME CONTROLLER ACCEPTED AGE DESCRIPTION Gateways
bar-com-internal-gateway-class bar.baz/internal-gateway-class True 100d Internal Load Balancer 10
foo-com-external-gateway-class foo.com/external-gateway-class True 365d External Load Balancer 25
gwctl get gateway -o wide
NAME CLASS ADDRESSES PORTS PROGRAMMED AGE POLICIES HTTPROUTES
demo-gateway-2 external-class 10.0.0.1 80 True 20d 10 5
abc-gateway-12345 internal-class 192.168.100.5 443,8080 False 5d 2 1
random-gateway regional-internal-class 10.11.12.13 8443 Unknown 3s 3 5
gwctl get httproute -o wide
NAMESPACE NAME HOSTNAMES PARENT REFS AGE POLICIES
default foo-httproute-1 example.com,example2.com + 1 more ns2/demo-gateway-2 5m 2
default qmn-httproute-100 example.com demo-gateway-1 5m 1
ns1 bar-route-21 foo.com,bar.com + 5 more default/demo-gateway-200 5m 3
ns2 bax-httproute-18777 None ns1/demo-gateway-345 5m 4
gwctl get namespace -o wide
NAME STATUS AGE POLICIES
default Active 46d 3
kube-system Active 46d 5
gwctl get backend -o wide
NAME TYPE REFERRED BY ROUTES AGE POLICIES
foo-svc Service foo-httproute-1,abc-httproute-33 + 4 more 45m 5
bar-baz-svc Service bar-httproute 11d 1
gwctl get policycrds -o wide
NAME POLICY TYPE SCOPE POLICIES COUNT AGE
healthcheckpolicies.foo.com Direct Namespaced 1 5d
retryonpolicies.foo.com Direct Namespaced 2 4d
timeoutpolicies.bar.com Inherited Cluster 1 10m
tlsminimumversionpolicies.baz.com Direct Namespaced 3 45s
gwctl get policies -o wide
NAME KIND TARGET NAME TARGET KIND POLICY TYPE AGE
demo-timeout-policy-on-gatewayclass TimeoutPolicy.foo.com foo-com-external-gateway-class GatewayClass Inherited 10d
demo-timeout-policy-on-namespace TimeoutPolicy.foo.com default Namespace Inherited 10d
demo-health-check-1 HealthCheckPolicy.bar.com demo-gateway-1 Gateway Direct 10d
demo-retry-policy-1 RetryOnPolicy.baz.com demo-gateway-1 Gateway Direct 10d
demo-retry-policy-2 RetryOnPolicy.baz.com demo-httproute-2 HTTPRoute Direct 10d
demo-tls-min-version-policy-1 TLSMinimumVersionPolicy.foobar.com demo-gateway-3 Gateway Direct 10d
demo-tls-min-version-policy-2 TLSMinimumVersionPolicy.foobar.com demo-gateway-4 Gateway Direct 10d
gwctl describe gateway demo-gateway
Name: demo-gateway
Namespace: default
Labels: <none>
Annotations:
annotation.foo: value1
annotation.bar.baz: abcdefghijkl
API Version: gateway.networking.k8s.io/v1beta1
Kind: Gateway
Metadata:
creationTimestamp: "2023-12-01T18:29:41Z"
finalizers:
- gateway.finalizer.networking.io
generation: 4
resourceVersion: "310164667"
uid: ed046878-f659-4908-b80f-b88c9617ba8a
Spec:
gatewayClassName: l7-global-external-managed
listeners:
- allowedRoutes:
namespaces:
from: Same
name: http
port: 80
protocol: HTTP
Status:
addresses:
- type: IPAddress
value: 10.0.0.1
conditions:
- lastTransitionTime: "2023-12-01T18:49:25Z"
message: ""
observedGeneration: 3
reason: Programmed
status: "True"
type: Programmed
listeners:
- attachedRoutes: 1
conditions:
- lastTransitionTime: "2023-12-01T18:49:25Z"
message: Some message
observedGeneration: 3
reason: Ready
status: "True"
type: Ready
name: http
supportedKinds:
- group: gateway.networking.k8s.io
kind: HTTPRoute
AttachedRoutes:
Kind Name Namespace
---- ---- ---------
HTTPRoute demo-health-check-1 default
TCPRoute demo-retry-policy-1 default
DirectlyAttachedPolicies:
TYPE NAME
---- ----
TimeoutPolicy.foo.com demo-timeout-policy-on-gatewayclass
RetryOnPolicy.baz.com demo-retry-policy-1
InheritedPolicies:
TYPE NAME TARGET KIND TARGET NAME
---- ---- ----------- -----------
TimeoutPolicy.foo.com demo-timeout-policy-on-gatewayclass GatewayClass abc-gatewayclass
EffectivePolicies:
HealthCheckPolicy.foo.com:
sampleParentField:
sampleField: hello
RetryOnPolicy.foo.com:
sampleParentField:
sampleField: namaste
TimeoutPolicy.bar.com:
timeout1: parent
timeout2: child
timeout3: parent
timeout4: child
Events:
Type Reason Age From Message
---- ------ ---- ---- -------
Normal SYNC 2m12s (x46 over 138m) sc-gateway-controller SYNC on default/demo-gateway was a success
gwctl describe httproute demo-httproute
Name: demo-httproute
Namespace: default
Labels: <none>
Annotations: <none>
API Version: gateway.networking.k8s.io/v1beta1
Kind: HTTPRoute
Metadata:
creationTimestamp: "2023-11-09T09:45:03Z"
generation: 1
resourceVersion: "290416533"
uid: 716d9e5f-f57a-4e56-81f6-c579d5d17471
Spec:
hostnames:
- example.com
parentRefs:
- group: gateway.networking.k8s.io
kind: Gateway
name: demo-gateway
rules:
- backendRefs:
- group: ""
kind: Service
name: demo-svc
port: 80
weight: 1
matches:
- path:
type: PathPrefix
value: /example
Status:
parents:
- conditions:
- lastTransitionTime: "2023-12-01T18:49:14Z"
message: ""
observedGeneration: 1
reason: ReconciliationSucceeded
status: "True"
type: Reconciled
controllerName: networking.io/gateway
parentRef:
group: gateway.networking.k8s.io
kind: Gateway
name: demo-gateway
DirectlyAttachedPolicies:
TYPE NAME
---- ----
HealthCheckPolicy.foo.com demo-health-check-1
RetryOnPolicy.baz.com demo-retry-policy-1
InheritedPolicies:
TYPE NAME TARGET KIND TARGET NAME
---- ---- ----------- -----------
TimeoutPolicy.foo.com demo-timeout-policy-on-gatewayclass GatewayClass abc-gatewayclass
RetryOnPolicy.baz.com demo-retry-policy-1 Gateway abc-gateway
EffectivePolicies:
HealthCheckPolicy.foo.com:
sampleParentField:
sampleField: hello
RetryOnPolicy.foo.com:
sampleParentField:
sampleField: namaste
TimeoutPolicy.bar.com:
timeout1: parent
timeout2: child
timeout3: parent
timeout4: child
Events:
Type Reason Age From Message
---- ------ ---- ---- -------
Normal SYNC 2m12s (x46 over 138m) sc-gateway-controller SYNC on default/demo-gateway was a success
gwctl describe gatewayclass foo-com-external-gateway-class
Name: foo-com-external-gateway-class
Labels: <none>
Annotations <none>
API Version gateway.networking.k8s.io/v1beta1
Kind: GatewayClass
Metadata:
creationTimestamp: "2023-06-28T17:33:03Z"
generation: 1
resourceVersion: "108322484"
uid: 80cea521-5416-41c4-b5d1-2ee30f5366a6
ControllerName: foo.com/external-gateway-class
Description: Create an external load balancer
Status:
conditions:
- lastTransitionTime: "2023-05-22T17:29:47Z"
message: ""
observedGeneration: 1
reason: Accepted
status: "True"
type: Accepted
DirectlyAttachedPolicies:
TYPE NAME
---- ----
TimeoutPolicy.bar.com demo-timeout-policy-on-gatewayclass