-
Notifications
You must be signed in to change notification settings - Fork 333
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
docs(*): new policy matching proposal #4474
Conversation
Signed-off-by: Ilya Lobkov <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Great start! I've left a few comments and I think we're missing:
- Showing an example of a policy that's neither inbound nor outbound (did we have one in the end? If not thinking about one to prove our system works would be good).
- Showing an example of a policy that's both inbound and outbound (trafficLog I believe is one of them)
- Schema of TargetRef
- Mention how we're going to roll this out (new policies that will replace existing policies)
- Explain that follow MADR will come to describe each of the new policy
- Explain that the top targetRef always identifies the set of DPP that is being modified
* ProxyGroup | ||
* Proxy | ||
* MeshGatewayRoute | ||
* HTTPRoute |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Also didn't we talked about a ServiceGroup
or ServiceSubset
which is like a ProxyGroup
except that kuma.io/service
is required?
* ProxyGroup | ||
* Proxy | ||
* MeshGatewayRoute | ||
* HTTPRoute |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Also didn't we talked about a ServiceGroup
or ServiceSubset
which is like a ProxyGroup
except that kuma.io/service
is required?
Do you have an example of a policy that supports |
Signed-off-by: Ilya Lobkov <[email protected]>
ServiceSubset is to make it clear that this can't be matched across services. So:
I imagine things like HTTPRoute would want build a subset of a service (the slow rollout case with a version) That would need to be a ServiceSubset and not a ProxyGroup).
|
Codecov Report
@@ Coverage Diff @@
## master #4474 +/- ##
==========================================
+ Coverage 55.40% 55.42% +0.01%
==========================================
Files 947 947
Lines 58041 58041
==========================================
+ Hits 32157 32167 +10
+ Misses 23328 23327 -1
+ Partials 2556 2547 -9
Continue to review full report at Codecov.
|
Signed-off-by: Ilya Lobkov <[email protected]>
@lahabana I renamed ProxyGroup to ServiceSubset and added a new MeshSubset level, so now it looks like:
yes, so now if you want targetRef:
kind: MeshSubset
tags:
key1: value1 |
todo:
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I don't see anywhere an explanation that states that "to" and "from" will have different valid subsets of "targetRef.kind"
So service subset will ALWAYS require a serviceName to be set? Also MeshSubset will never be usable in |
Signed-off-by: Ilya Lobkov <[email protected]>
Signed-off-by: Ilya Lobkov <[email protected]>
Signed-off-by: Ilya Lobkov <[email protected]>
Signed-off-by: Ilya Lobkov <[email protected]>
Signed-off-by: Ilya Lobkov <[email protected]>
That's down to policies, in usecases you can find allowed values for each policy |
Signed-off-by: Ilya Lobkov <[email protected]>
Yes, I think we can avoid having
You can use
I'm not sure if more exceptions make it simpler. I'd allow both MeshSubset and ServiceSubset in top level, I think it's clear that the latter is more specific |
Awaiting for decision:
|
Signed-off-by: Ilya Lobkov <[email protected]>
Signed-off-by: Ilya Lobkov <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Two comments about PolicyAttachment compliance
Signed-off-by: Ilya Lobkov <[email protected]>
Signed-off-by: Ilya Lobkov <[email protected]>
Signed-off-by: Ilya Lobkov <[email protected]>
Signed-off-by: Ilya Lobkov <[email protected]>
Signed-off-by: Ilya Lobkov <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
lgtm
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
some nitpicks and questions, nice work overall 👍
Co-authored-by: Krzysztof Słonka <[email protected]> Signed-off-by: Ilya Lobkov <[email protected]>
Signed-off-by: Ilya Lobkov <[email protected]>
Summary
Rendered version to read
Full changelog
Issues resolved
Updates #3330
Documentation
Testing
Backwards compatibility
UPGRADE.md
with any steps users will need to take when upgrading.backport-to-stable
label if the code follows our backporting policy