-
Notifications
You must be signed in to change notification settings - Fork 41
Open
Labels
enhancementNew feature or requestNew feature or request
Description
Feature Request: Allow disabling Ingress to support external Gateway API management
Is your feature request related to a problem?
Yes. Currently, the operator automatically manages an Ingress resource. When trying to use the Gateway API, there is no clean way to prevent the operator from managing Ingress without potentially breaking the deployment or having the operator "reconcile" (overwrite) manual changes.
The Goal
I want to use the WordPress operator but I want to manage the external traffic routing myself using HTTPRoute resources.
Proposed Change
Add a toggle in the Custom Resource (CRD) to completely disable Ingress generation.
Example CRD Configuration:
spec:
ingress:
enabled: false # This would tell the operator NOT to create an Ingress resource
Why this is better than the current workaround:
- No Resource Conflict: Prevents the operator's reconciliation loop from recreating unwanted Ingress resources.
- Gateway API Compatibility: Allows users to define an
HTTPRoutethat targets theServicecreated by the operator. - Separation of Concerns: The operator focuses on the WordPress lifecycle, while the cluster's Load Balancer/Gateway focuses on traffic.
Technical Requirement
For this to work effectively, the operator must ensure that the Service (ClusterIP) remains stable and predictable even when ingress.enabled is false, so that the manual HTTPRoute has a consistent backend ref to point to.
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
enhancementNew feature or requestNew feature or request