-
Notifications
You must be signed in to change notification settings - Fork 363
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: add egctl ratelimit config support #2674
Merged
Merged
Changes from 1 commit
Commits
Show all changes
3 commits
Select commit
Hold shift + click to select a range
File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,204 @@ | ||
// Copyright Envoy Gateway Authors | ||
// SPDX-License-Identifier: Apache-2.0 | ||
// The full text of the Apache license is available in the LICENSE file at | ||
// the root of the repo. | ||
|
||
package egctl | ||
|
||
import ( | ||
"context" | ||
"errors" | ||
"fmt" | ||
"io" | ||
"net/http" | ||
|
||
"github.com/envoyproxy/gateway/api/v1alpha1" | ||
"github.com/envoyproxy/gateway/internal/envoygateway" | ||
"github.com/envoyproxy/gateway/internal/infrastructure/kubernetes/ratelimit" | ||
"github.com/envoyproxy/gateway/internal/kubernetes" | ||
ShyunnY marked this conversation as resolved.
Show resolved
Hide resolved
|
||
"github.com/spf13/cobra" | ||
"k8s.io/apimachinery/pkg/runtime/serializer" | ||
"k8s.io/apimachinery/pkg/types" | ||
|
||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" | ||
cmdutil "k8s.io/kubectl/pkg/cmd/util" | ||
) | ||
|
||
var ( | ||
defaultRateLimitNamespace = "envoy-gateway-system" | ||
zirain marked this conversation as resolved.
Show resolved
Hide resolved
|
||
defaultConfigMap = "envoy-gateway-config" | ||
defaultConfigMapKey = "envoy-gateway.yaml" | ||
) | ||
|
||
func ratelimitConfigCommand() *cobra.Command { | ||
|
||
var ( | ||
namespace string | ||
) | ||
|
||
rlConfigCmd := &cobra.Command{ | ||
Use: "envoy-ratelimit", | ||
Aliases: []string{"rl"}, | ||
Long: `Retrieve the relevant rate limit configuration from the Rate Limit instance`, | ||
Example: ` # Retrieve rate limit configuration | ||
egctl config ratelimit | ||
ShyunnY marked this conversation as resolved.
Show resolved
Hide resolved
|
||
|
||
# Retrieve rate limit configuration with short syntax | ||
egctl c rl | ||
`, | ||
Run: func(c *cobra.Command, args []string) { | ||
cmdutil.CheckErr(runRateLimitConfig(c, namespace)) | ||
}, | ||
} | ||
|
||
rlConfigCmd.Flags().StringVarP(&namespace, "namespace", "n", defaultRateLimitNamespace, "Specific a namespace to get resources") | ||
return rlConfigCmd | ||
} | ||
|
||
func runRateLimitConfig(c *cobra.Command, ns string) error { | ||
|
||
cli, err := getCLIClient() | ||
if err != nil { | ||
return err | ||
} | ||
|
||
out, err := retrieveRateLimitConfig(cli, ns) | ||
if err != nil { | ||
return err | ||
} | ||
|
||
_, err = fmt.Fprintln(c.OutOrStdout(), string(out)) | ||
return err | ||
} | ||
|
||
func retrieveRateLimitConfig(cli kubernetes.CLIClient, ns string) ([]byte, error) { | ||
|
||
// Before retrieving the rate limit configuration | ||
// we make sure that the global rate limit feature is enabled | ||
if enable, err := checkEnableGlobalRateLimit(cli); !enable { | ||
return nil, fmt.Errorf("global rate limit feature is not enabled") | ||
} else if err != nil { | ||
return nil, fmt.Errorf("failed to get global rate limit status: %w", err) | ||
} | ||
|
||
// Filter out all rate limit pods in the Running state | ||
rlNN, err := fetchRunningRateLimitPods(cli, ns, ratelimit.RateLimitLabelSelector()) | ||
if err != nil { | ||
return nil, err | ||
} | ||
|
||
// In fact, the configuration of multiple rate limit replicas are the same. | ||
// After we filter out the rate limit Pods in the Running state, | ||
// we can directly use the first pod. | ||
rlPod := rlNN[0] | ||
fw, err := portForwarder(cli, rlPod, rateLimitDebugPort) | ||
if err != nil { | ||
return nil, fmt.Errorf("failed to initialize pod-forwarding for %s/%s: %w", rlPod.Namespace, rlPod.Name, err) | ||
} | ||
|
||
return extractRateLimitConfig(fw, rlPod) | ||
} | ||
|
||
// fetchRunningRateLimitPods gets the rate limit Pods, based on the labelSelectors. | ||
// It further filters out only those rate limit Pods that are in "Running" state. | ||
func fetchRunningRateLimitPods(cli kubernetes.CLIClient, namespace string, labelSelector []string) ([]types.NamespacedName, error) { | ||
|
||
// Since multiple replicas of the rate limit are configured to be equal, | ||
// we do not need to use the pod name to obtain the specified pod. | ||
rlPods, err := cli.PodsForSelector(namespace, labelSelector...) | ||
if err != nil { | ||
return nil, err | ||
} | ||
|
||
rlNN := []types.NamespacedName{} | ||
for _, rlPod := range rlPods.Items { | ||
rlPodNsName := types.NamespacedName{ | ||
Namespace: rlPod.Namespace, | ||
Name: rlPod.Name, | ||
} | ||
if rlPod.Status.Phase != "Running" { | ||
ShyunnY marked this conversation as resolved.
Show resolved
Hide resolved
|
||
continue | ||
} | ||
|
||
rlNN = append(rlNN, rlPodNsName) | ||
} | ||
if len(rlNN) == 0 { | ||
return nil, fmt.Errorf("please check that the rate limit instance starts properly") | ||
} | ||
|
||
return rlNN, nil | ||
} | ||
|
||
func extractRateLimitConfig(fw kubernetes.PortForwarder, rlPod types.NamespacedName) ([]byte, error) { | ||
|
||
if err := fw.Start(); err != nil { | ||
return nil, fmt.Errorf("failed to start port forwarding for pod %s/%s: %w", rlPod.Namespace, rlPod.Name, err) | ||
} | ||
defer fw.Stop() | ||
|
||
out, err := rateLimitConfigRequest(fw.Address()) | ||
if err != nil { | ||
return nil, fmt.Errorf("failed to send request to get rate config for pod %s/%s: %w", rlPod.Namespace, rlPod.Name, err) | ||
} | ||
|
||
return out, nil | ||
} | ||
|
||
// checkEnableGlobalRateLimit Check whether the Global Rate Limit function is enabled | ||
func checkEnableGlobalRateLimit(cli kubernetes.CLIClient) (bool, error) { | ||
|
||
kubeCli := cli.Kube() | ||
cm, err := kubeCli.CoreV1(). | ||
ConfigMaps(defaultRateLimitNamespace). | ||
Get(context.TODO(), defaultConfigMap, metav1.GetOptions{}) | ||
if err != nil { | ||
return false, err | ||
} | ||
|
||
config, ok := cm.Data[defaultConfigMapKey] | ||
if !ok { | ||
return false, fmt.Errorf("failed to get envoy-gateway configuration") | ||
} | ||
|
||
decoder := serializer.NewCodecFactory(envoygateway.GetScheme()).UniversalDeserializer() | ||
obj, gvk, err := decoder.Decode([]byte(config), nil, nil) | ||
if err != nil { | ||
return false, err | ||
} | ||
|
||
if gvk.Group != v1alpha1.GroupVersion.Group || | ||
gvk.Version != v1alpha1.GroupVersion.Version || | ||
gvk.Kind != v1alpha1.KindEnvoyGateway { | ||
return false, errors.New("failed to decode unmatched resource type") | ||
} | ||
|
||
eg, ok := obj.(*v1alpha1.EnvoyGateway) | ||
if !ok { | ||
return false, errors.New("failed to convert object to EnvoyGateway type") | ||
} | ||
|
||
if eg.RateLimit == nil || eg.RateLimit.Backend.Redis == nil { | ||
return false, nil | ||
} | ||
|
||
return true, nil | ||
} | ||
|
||
func rateLimitConfigRequest(address string) ([]byte, error) { | ||
url := fmt.Sprintf("http://%s/rlconfig", address) | ||
|
||
req, err := http.NewRequest("GET", url, nil) | ||
if err != nil { | ||
return nil, err | ||
} | ||
|
||
resp, err := http.DefaultClient.Do(req) | ||
if err != nil { | ||
return nil, err | ||
} | ||
defer func() { | ||
_ = resp.Body.Close() | ||
}() | ||
|
||
return io.ReadAll(resp.Body) | ||
} |
Oops, something went wrong.
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
why not use
ratelimitConfigCommand
directly?There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I have thought about this problem, but I hope to write it like the
func proxyCommand()
function for backward compatibility.