Test configurations before apply #4406
Replies: 2 comments 4 replies
-
I don't believe this is necessary. Here's what I mean (Using a VirtualServer config in this example). This just means we should be able to save on writing additional temporary files. |
Beta Was this translation helpful? Give feedback.
-
Turns out, this is a non-issue and there is a last attempt fail safe when applying configuration to NGINX. |
Beta Was this translation helpful? Give feedback.
-
As an additional measure of safety this implementation should validate new nginx configurations before applying them.
The theory is that a temporary nginx.conf should be written and validated similar to
nginx -t -c <filename>.conf
The intention of doing this is to intercept any errors that customers may introduce through the use of snippets or custom templates or other ways to extend NGINX configuration.
When customers apply configurations using a CRD we are able to provide input validation and safety through the API itself. When a customer takes advantage of the ways that we allow the capabilities to be extended beyond the limitations of the CRDs or Ingress object they can put themselves in a situation where a missing ';' at the end of a line can result in a non-operational nginx configuration and thus cause a momentary outage while they revert the changes.
Acceptance Criteria:
This can potentially leave the customer in a state where configurations are not being applied and thus the pod logs need be inspected for errors. But that is a better result than allowing the customer in inadvertently breaking their applications and causing an outage due to a missing ';'
Beta Was this translation helpful? Give feedback.
All reactions