-
Notifications
You must be signed in to change notification settings - Fork 595
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Spike: figure out a path forward for misconfigured KongPlugin resources #680
Comments
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
We have run into this problem many times. Our entire cluster goes down since the gateway fails if one plugin is misconfigured. This is a very concerning issue to us. We may drop Kong altogether because of it.
|
Please configure and install validating webhook: https://docs.konghq.com/kubernetes-ingress-controller/2.1.x/deployment/admission-webhook/#main That will get rid of the problem in most cases. |
That's great thanks for the quick response we will look in to this. |
In #2195 we are addressing this problem holistically and attempting to do it in ways that wont technically require the validating webhook (however, please do install it). We're going to close this in favor of #2195, please subscribe to that issue to track the progress of improvements in this regard. |
Users always run into issues with malformed plugin configurations which brings down the entire reconciliation loop.
Figure out a way to avoid this from happening.
One are to explore will be to use Kong's /schema endpoint a lot more to verify if each KongPlugin is valid or not.
This will need to be cached to avoid performance issues when the network latency between the controller and Kong is significant (> 10s of milliseconds)
Acceptance criteria
TBD (@shaneutt to shepherd this issue)
The text was updated successfully, but these errors were encountered: