Overrides limit definitions. This field is mutually exclusive with the limits field and defaults field. This field is only allowed for policies targeting Gateway in targetRef.kind
limits
MapLimit>
No
Limit definitions. This field is mutually exclusive with the defaults field
SectionName is the name of a section in a Kubernetes resource. In the following resources, SectionName is interpreted as the following: Gateway: Listener name HTTPRoute: HTTPRouteRule name * Service: Port name
List of rate limit counter qualifiers. Items must be a valid Well-known attribute. Each distinct value resolved in the data plane starts a separate counter for each rate limit.
apiVersion:kuadrant.io/v1kind:RateLimitPolicymetadata:name:my-rate-limit-policyspec:# Reference to an existing networking resource to attach the policy to. REQUIRED.# It can be a Gateway API HTTPRoute or Gateway resource.# It can only refer to objects in the same namespace as the RateLimitPolicy.targetRef:group:gateway.networking.k8s.iokind:HTTPRoute / Gatewayname:myroute / mygateway# The limits definitions to apply to the network traffic routed through the targeted resource.# Equivalent to if otherwise declared within `defaults`.limits:"my_limit":# The rate limits associated with this limit definition. REQUIRED.# E.g., to specify a 50rps rate limit, add `{ limit: 50, duration: 1, unit: secod }`rates:[…]# Counter qualifiers.# Each dynamic value in the data plane starts a separate counter, combined with each rate limit.# E.g., to define a separate rate limit for each user name detected by the auth layer, add `metadata.filter_metadata.envoy\.filters\.http\.ext_authz.username`.# Check out Kuadrant RFC 0002 (https://github.com/Kuadrant/architecture/blob/main/rfcs/0002-well-known-attributes.md) to learn more about the Well-known Attributes that can be used in this field.counters:[…]# Additional dynamic conditions to trigger the limit.# Use it for filtering attributes not supported by HTTPRouteRule or with RateLimitPolicies that target a Gateway.# Check out Kuadrant RFC 0002 (https://github.com/Kuadrant/architecture/blob/main/rfcs/0002-well-known-attributes.md) to learn more about the Well-known Attributes that can be used in this field.when:[…]# Explicit defaults. Used in policies that target a Gateway object to express default rules to be enforced on# routes that lack a more specific policy attached to.# Mutually exclusive with `overrides` and with declaring `limits` at the top-level of the spec.defaults:limits:{…}# Overrides. Used in policies that target a Gateway object to be enforced on all routes linked to the gateway,# thus also overriding any more specific policy occasionally attached to any of those routes.# Mutually exclusive with `defaults` and with declaring `limits` at the top-level of the spec.overrides:limits:{…}