Skip to content

Commit

Permalink
Separated kuadrant policies
Browse files Browse the repository at this point in the history
  • Loading branch information
Ygnas committed Oct 20, 2023
1 parent bdb9d69 commit 195aa00
Show file tree
Hide file tree
Showing 15 changed files with 1,031 additions and 835 deletions.
4 changes: 4 additions & 0 deletions config/examples/dashboards/kustomization.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -31,3 +31,7 @@ configMapGenerator:
namespace: monitoring
files:
- ./udproutes.json
- name: grafana-policies
namespace: monitoring
files:
- ./policies.json
4 changes: 4 additions & 0 deletions config/examples/enterprise/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -72,10 +72,14 @@ There are 3 Gateways with various services attached.
```bash
kind create cluster
kubectl create -f ../../gateway-api/crd/standard/
kubectl apply -f ../../kuadrant/crd/
kubectl create -f ./all.yaml
kubectl replace --subresource=status -f ./all.yaml
kubectl apply -f ../../kuadrant/kuadrant.yaml
kubectl replace --subresource=status -f ../../kuadrant/kuadrant.yaml
kubectl apply --server-side -f ../kube-prometheus/bundle_crd.yaml
kubectl apply -f ../kube-prometheus/bundle.yaml
kubectl patch clusterrole kube-state-metrics --type=json -p "$(cat ../../kuadrant/clusterrole-patch.yaml)"
kubectl -n monitoring wait --timeout=5m deployment/grafana --for=condition=Available
kubectl -n monitoring port-forward service/grafana 3000:3000 > /dev/null &
kubectl -n monitoring rollout status --watch --timeout=5m statefulset/prometheus-k8s
Expand Down
90 changes: 0 additions & 90 deletions config/examples/enterprise/all.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -625,96 +625,6 @@ status:
- group: gateway.networking.k8s.io
kind: GRPCRoute
---
apiVersion: kuadrant.io/v1alpha1
kind: TLSPolicy
metadata:
name: external
namespace: istio-system
spec:
targetRef:
name: external
group: gateway.networking.k8s.io
kind: Gateway
issuerRef:
group: cert-manager.io
kind: ClusterIssuer
name: selfsigned-cluster-issuer
status:
conditions:
- lastTransitionTime: "2023-08-21T22:53:08Z"
message: Gateway is TLS Enabled
reason: GatewayTLSEnabled
status: "True"
type: Ready
---
apiVersion: kuadrant.io/v1alpha1
kind: TLSPolicy
metadata:
name: internal
namespace: istio-system
spec:
targetRef:
name: internal
group: gateway.networking.k8s.io
kind: Gateway
issuerRef:
group: cert-manager.io
kind: ClusterIssuer
name: selfsigned-cluster-issuer
status:
conditions:
- lastTransitionTime: "2023-08-21T22:53:08Z"
message: Gateway is TLS Enabled
reason: GatewayTLSEnabled
status: "True"
type: Ready
---
apiVersion: kuadrant.io/v1beta2
kind: RateLimitPolicy
metadata:
name: rlp-www
spec:
targetRef:
group: gateway.networking.k8s.io
kind: HTTPRoute
name: www
limits:
"global":
rates:
- limit: 5
duration: 10
unit: second
status:
conditions:
- lastTransitionTime: "2023-08-21T22:53:08Z"
message: HTTPRoute is ratelimited
reason: HTTPRouteProtected
status: "True"
type: Available
---
apiVersion: kuadrant.io/v1beta2
kind: RateLimitPolicy
metadata:
name: rlp-cdn
spec:
targetRef:
group: gateway.networking.k8s.io
kind: HTTPRoute
name: cdn
limits:
"global":
rates:
- limit: 5
duration: 10
unit: second
status:
conditions:
- lastTransitionTime: "2023-08-21T22:53:08Z"
message: HTTPRoute is ratelimited
reason: HTTPRouteProtected
status: "True"
type: Available
---
apiVersion: gateway.networking.k8s.io/v1alpha2
kind: BackendTLSPolicy
metadata:
Expand Down
Loading

0 comments on commit 195aa00

Please sign in to comment.