-
Notifications
You must be signed in to change notification settings - Fork 13
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ROX-19562: Add annotations to rate limit managed-central routes traffic #1288
ROX-19562: Add annotations to rate limit managed-central routes traffic #1288
Conversation
Skipping CI for Draft Pull Request. |
51c70e7
to
427fd8f
Compare
23f3386
to
591c49a
Compare
6319464
to
f693384
Compare
fb58e81
to
8b78e0a
Compare
d7d2c9b
to
2c01aee
Compare
New changes are detected. LGTM label has been removed. |
2c01aee
to
9dd71e5
Compare
9dd71e5
to
82ff178
Compare
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: janisz, rhybrillou The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Description
In order to protect against (D)DOS attacks, the OpenShift routes to Central managed by FleetShard sync are being annotated in order to activate traffic throttling features.
The default values were derived from the haproxy metrics available in the current ACS CS instances.
Assuming all the averaged requests were a burst of concurrent requests, these could have been about 3000 requests.
Adding a safety 10 factor, and using powers of two as throttling value, the default would be 32768 concurrent requests.
Checklist (Definition of Done)
Test manual
ROX-12345: ...
Test manual
TODO: Add manual testing efforts