You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Is your enhancement request related to a problem? Please describe.
Right now our deployment simply uses the publicly available nginx image. While convenient, there are some downsides of this.
Users have to create a ConfigMap containing our custom http matching module, which gets mounted as a volume into the nginx container. This pattern would be repeated for any new modules that we would add. If the ConfigMap is forgotten, the Pod fails to start.
We have to run an init container to set the proper permissions on the /etc/nginx directory so that it can be written to.
What would you like to be added:
The remedy for this is to package and distribute our own data plane container image. We would use the public nginx image as the base, and build on top of that.
Why this is needed:
This solves the issues mentioned under the problem above.
Additional context
Custom modules are packaged directly into the image, removing the need for ConfigMaps and volume mounts
Directory permissions are defined in the image itself, removing the need for an init container
Is your enhancement request related to a problem? Please describe.
Right now our deployment simply uses the publicly available nginx image. While convenient, there are some downsides of this.
What would you like to be added:
The remedy for this is to package and distribute our own data plane container image. We would use the public nginx image as the base, and build on top of that.
Why this is needed:
This solves the issues mentioned under the problem above.
Additional context
See discussion #754 for more context.
A/C:
The text was updated successfully, but these errors were encountered: