Gateway API: Spike on RateLimitFilter#4775
Gateway API: Spike on RateLimitFilter#4775sunjayBhatia wants to merge 2 commits intoprojectcontour:mainfrom
Conversation
Signed-off-by: Sunjay Bhatia <sunjayb@vmware.com>
Signed-off-by: Sunjay Bhatia <sunjayb@vmware.com>
Codecov Report
Additional details and impacted files@@ Coverage Diff @@
## main #4775 +/- ##
==========================================
- Coverage 75.98% 75.79% -0.19%
==========================================
Files 140 140
Lines 16787 16834 +47
==========================================
+ Hits 12755 12759 +4
- Misses 3780 3823 +43
Partials 252 252
|
|
This looks great, nice to see it in action. I guess this one is an easy one to do as a per-HTTPRoute filter, because Envoy actually supports per-route config for it. Nice that you could define a single RateLimitFilter resource, and then reference it from a number of different routes, if you wanted the same rate limits to apply across multiple routes. You could even have an admission controller that automatically adds it to routes, though that kind of behavior starts to overlap with the "Policy" side of things. Would be interesting to look across the various features that HTTPProxy has and see how many of them could be implemented like this. Thinking through this some more, it also seems far easier to implement a Filter, than to implement a Policy, since you don't have to implement all of the defaults/overrides across various layers of the resource graph. |
|
The Contour project currently lacks enough contributors to adequately respond to all PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to the #contour channel in the Kubernetes Slack |
|
The Contour project currently lacks enough contributors to adequately respond to all PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to the #contour channel in the Kubernetes Slack |
|
The Contour project currently lacks enough contributors to adequately respond to all PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to the #contour channel in the Kubernetes Slack |
|
The Contour project currently lacks enough contributors to adequately respond to all PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to the #contour channel in the Kubernetes Slack |
|
The Contour project currently lacks enough contributors to adequately respond to all PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to the #contour channel in the Kubernetes Slack |
|
The Contour project currently lacks enough contributors to adequately respond to all PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to the #contour channel in the Kubernetes Slack |
Shows how a HTTPRoute Filter based implementation might look for rate limiting
so far just "local" rate limiting implemented
Example usable via manifest: