-
Notifications
You must be signed in to change notification settings - Fork 26
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Rate limiting #1365
Comments
We are still doing research and POC around Envoy global rate limit service |
POC phase is finished, meeting with kyma lead architect happened. During the meeting it was decided to split story into: local rate limiting helping with overload of workloads and global rate limiting. Internally goats decided that at this point local rate limiting will become a part of Istio module. New CRD supporting local rate limiting and then later on global rate limiting will be introduced along with new controller. |
working on technical design including CRD proposal. |
technical design and API design documented: https://github.com/kyma-project/istio/blob/main/docs/contributor/adr/0008-rate-limit.md |
Description
Istio module should support rate limiting. New CRD should be introduced to support rate limiting configuration. User should be able to limit access to given workload based on caller ID, custom header or client certificate. Introduced CRD should hide complexity of EnvoyFilters.
TODO:
Reasons
Attachments
https://istio.io/latest/docs/tasks/policy-enforcement/rate-limit/
kyma-project/kyma#17572
https://killercoda.com/interactive-kyma/scenario/rate-limit
The text was updated successfully, but these errors were encountered: