Gateway API: Spike on RateLimitPolicy#4776
Gateway API: Spike on RateLimitPolicy#4776sunjayBhatia wants to merge 6 commits intoprojectcontour:mainfrom
Conversation
Signed-off-by: Sunjay Bhatia <sunjayb@vmware.com>
Signed-off-by: Sunjay Bhatia <sunjayb@vmware.com>
can target a Gateway or HTTPRoute if multiple policies, they are merged, with defaults and overrides being applied in reverse order according to https://gateway-api.sigs.k8s.io/references/policy-attachment/#hierarchy Signed-off-by: Sunjay Bhatia <sunjayb@vmware.com>
|
The Contour project currently lacks enough contributors to adequately respond to all PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to the #contour channel in the Kubernetes Slack |
|
The Contour project currently lacks enough contributors to adequately respond to all PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to the #contour channel in the Kubernetes Slack |
Signed-off-by: Sunjay Bhatia <sunjayb@vmware.com>
Signed-off-by: Sunjay Bhatia <sunjayb@vmware.com>
Signed-off-by: Sunjay Bhatia <sunjayb@vmware.com>
|
The Contour project currently lacks enough contributors to adequately respond to all PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to the #contour channel in the Kubernetes Slack |
|
The Contour project currently lacks enough contributors to adequately respond to all PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to the #contour channel in the Kubernetes Slack |
|
The Contour project currently lacks enough contributors to adequately respond to all PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to the #contour channel in the Kubernetes Slack |
|
The Contour project currently lacks enough contributors to adequately respond to all PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to the #contour channel in the Kubernetes Slack |
Shows how a Policy based approach may look for (local) rate limiting
Example usable via manifest:
Rate limit for
policy-example.com/api/needs-ratelimitis 2/min with 503 returned when rate limitedAll other paths under
policy-example.comare 10/min with 503 returned when rate limitedRate limit for
some-other-site.comis 10/min with 503 returned when rate limited