-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
router: add new ratelimited retry backoff strategy #12202
Changes from all commits
0f0916b
c188936
dcc4e14
6908897
5cabd3c
902f17c
40e7b0a
c926c9c
8946044
0f5eb62
c965008
d2ae1a0
96e5364
97fcc0b
52b39b7
cc6d146
e4dd05c
2edaf26
fad4cee
fbd7ae1
2fc0bec
d5d314d
b285474
775aa7e
37d667f
6b82264
59b06d4
1bef83e
1fd484a
4abc240
b9c33f1
77e0ff9
6180297
d7d798c
78b319e
f7fc6b4
8521e02
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -63,6 +63,7 @@ New Features | |
* ratelimit: added :ref:`enable_x_ratelimit_headers <envoy_v3_api_msg_extensions.filters.http.ratelimit.v3.RateLimit>` option to enable `X-RateLimit-*` headers as defined in `draft RFC <https://tools.ietf.org/id/draft-polli-ratelimit-headers-03.html>`_. | ||
* rbac filter: added a log action to the :ref:`RBAC filter <envoy_v3_api_msg_config.rbac.v3.RBAC>` which sets dynamic metadata to inform access loggers whether to log. | ||
* redis: added fault injection support :ref:`fault injection for redis proxy <envoy_v3_api_field_extensions.filters.network.redis_proxy.v3.RedisProxy.faults>`, described further in :ref:`configuration documentation <config_network_filters_redis_proxy>`. | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I think you had a merge issue here. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Thank you! Fixed now. |
||
* router: added a new :ref:`rate limited retry back off <envoy_v3_api_msg_config.route.v3.RetryPolicy.RateLimitedRetryBackOff>` strategy that uses headers like `Retry-After` or `X-RateLimit-Reset` to decide the back off interval. | ||
* router: added new | ||
:ref:`envoy-ratelimited<config_http_filters_router_retry_policy-envoy-ratelimited>` | ||
retry policy, which allows retrying envoy's own rate limited responses. | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
What do you think about folding this in to the
RetryBackoff
message? It seems logically related since it will govern what the final backoff time is?There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
That's definitely possible. I figured it made more sense to make it clear that it's a separate code path with its own parameters and the new stat
upstream_rq_retry_backoff_ratelimited
to reflect whether it's being used or not.In the doc update I pushed the mechanism does take a fair bit of explaining, so I think that might be another reason to keep them separated.