-
Notifications
You must be signed in to change notification settings - Fork 689
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Make downstream Listener connection limit configurable #5654
Comments
The Contour project currently lacks enough contributors to adequately respond to all Issues. This bot triages Issues according to the following rules:
You can:
Please send feedback to the #contour channel in the Kubernetes Slack |
Hi, we'd like help out and work on this issue. |
thanks @flawedmatrix @christianang! |
hm, github won't let me assign both of yall atm |
@flawedmatrix @christianang I may have misspoke when we chatted about configuring Listener downstream connection limits, I don't believe it can be done by a field on the Listener object itself, rather via "runtime" configuration: https://www.envoyproxy.io/docs/envoy/latest/configuration/listeners/runtime |
there is a global downstream connection limit available to configure, that we could maybe make a follow-on issue for: https://www.envoyproxy.io/docs/envoy/latest/api-v3/extensions/resource_monitors/downstream_connections/v3/downstream_connections.proto.html |
Please describe the problem you have
This is often useful for large installations in order to manage resources, prevent DDOS, etc. and falls in line with Envoys edge proxy guidelines: https://www.envoyproxy.io/docs/envoy/latest/configuration/best_practices/edge
This is an explicit follow on from #4717 to make key edge best practices configurable
The text was updated successfully, but these errors were encountered: