-
Epic
-
Resolution: Unresolved
-
Normal
-
None
-
None
-
None
-
Ingress controller Operations and performance customization
-
Strategic Product Work
-
3
-
False
-
-
False
-
OCPSTRAT-1413 - MicroShift support for Ingress Controller customization
-
OCPSTRAT-1413MicroShift support for Ingress Controller customization
-
14% To Do, 0% In Progress, 86% Done
-
M
OCP/Telco Definition of Done
Epic Template descriptions and documentation.
<--- Cut-n-Paste the entire contents of this description into your new Epic --->
Epic Goal
- introduce new configuration parameters that will make ingress controller more customizable in terms of performance and operations
- the new configurations will include:
- httpCompression - defines the policy for HTTP traffic compression.
mimeTypes defines a list of MIME types to which compression should be applied. For example, text/css; charset=utf-8, text/html, text/*, image/svg+xml, application/octet-stream, X-custom/customsub, using the format pattern, type/subtype; [;attribute=value]. The types are: application, image, message, multipart, text, video, or a custom type prefaced by X-; e.g. To see the full notation for MIME types and subtypes, see RFC1341 - httpHeaders - defines the policy for HTTP headers.By default, the policy is set to Append.
-
- Append specifies that the Ingress Controller appends the headers, preserving any existing headers.
-
- Replace specifies that the Ingress Controller sets the headers, removing any existing headers.
-
- IfNone specifies that the Ingress Controller sets the headers if they are not already set.
-
- Never specifies that the Ingress Controller never sets the headers, preserving any existing headers.
- tuningOptions - specifies options for tuning the performance of Ingress Controller pods see
- HTTPEmptyRequestsPolicy - describes how HTTP connections are handled if the connection times out before a request is received. Allowed values for this field are Respond and Ignore. The default value is Respond.
- Enable/Disable HTTP2 -
To enable the use of HTTP/2 for the connection from the client to HAProxy, a route must specify a custom certificate. A route that uses the default certificate cannot use HTTP/2. This restriction is necessary to avoid problems from connection coalescing, where the client re-uses a connection for different routes that use the same certificate.
Why is this important?
- …
Scenarios
- ...
Acceptance Criteria
- CI - MUST be running successfully with tests automated
- Release Technical Enablement - Provide necessary release enablement details and documents.
- ...
Dependencies (internal and external)
- ...
Previous Work (Optional):
- …
Open questions::
- …
Done Checklist
- CI - CI is running, tests are automated and merged.
- Release Enablement <link to Feature Enablement Presentation>
- DEV - Upstream code and tests merged: <link to meaningful PR or GitHub Issue>
- DEV - Upstream documentation merged: <link to meaningful PR or GitHub Issue>
- DEV - Downstream build attached to advisory: <link to errata>
- QE - Test plans in Polarion: <link or reference to Polarion>
- QE - Automated tests merged: <link or reference to automated tests>
- DOC - Downstream documentation merged: <link to meaningful PR>
- is cloned by
-
USHIFT-4092 MicroShift support for Ingress Controller errors and logging customization
- New