Given I've configured Envoy with LDS serving a TCP proxy listener on some port When the LDS is updated to remove that listener Then I expect all subsequent TCP connections to that port should be refused
write a bootstrap.yaml
like
---
TITLE: Feature request: Would like a way to refuse subsequent TCP connections while allowing current connections enough time to drain
This feature request was originally opened as envoyproxy/envoy#2920, but was too specific about the implementation. This issue updates the title and content to clarify the goals and be flexible about the implementation.
Given I've configured Envoy with LDS serving a TCP proxy listener on some port and there are connections in flight I would like a way to refuse subsequent TCP connections to that port while allowing current established connections to drain
# Vagrantfile for running Istio Pilot integration tests | |
# | |
# based on https://github.com/istio/istio/blob/master/.circleci/config.yml | |
# | |
# To use: | |
# - save this file as Vagrantfile in an otherwise empty directory | |
# - clone istio into a local gopath | |
# - update the synced_folder config line below with that path | |
# - vagrant up | |
# |
{ | |
"listeners": [ | |
{ | |
"address": "tcp://0.0.0.0:15001", | |
"name": "virtual", | |
"filters": [], | |
"bind_to_port": true, | |
"use_original_dst": true | |
}, | |
{ |
let g:clang_library_path='/Applications/Xcode.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/lib/libclang.dylib' |
prereqs:
sudo route add -net "10.244.0.0/16" "192.168.50.6"
Get some certs
certsDir="$HOME/workspace/deployments/lite/bbs-certs"
- type: replace | |
path: /instance_groups/name=diego-cell/jobs/name=rep/properties/diego/executor?/instance_identity_ca_cert | |
value: "((diego_instance_identity_ca.ca))" | |
- type: replace | |
path: /instance_groups/name=diego-cell/jobs/name=rep/properties/diego/executor?/instance_identity_key | |
value: "((diego_instance_identity_ca.private_key))" | |
- type: replace | |
path: /variables/- |
package testsupport | |
import ( | |
"sync" | |
"github.com/onsi/ginkgo/config" | |
) | |
var ( | |
lastPortUsed int |
Performance with iptables-restore
is significantly better than the performance of iptables
. For set sizes of 10k and 50k rules:
root@ubuntu-xenial:/home/ubuntu# iptables -F
root@ubuntu-xenial:/home/ubuntu# time (./restore-bulk-set 10000 | iptables-restore --noflush)
real 0m0.419s
user 0m0.232s
sys 0m0.180s