Skip to content

Commit 02f87a5

Browse files
🌱 Add envoy: Postgres filter: implement Postgres SSL termination and mission (#1709)
Signed-off-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com> Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
1 parent 41d8d4b commit 02f87a5

File tree

1 file changed

+77
-0
lines changed

1 file changed

+77
-0
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,77 @@
1+
{
2+
"version": "kc-mission-v1",
3+
"name": "envoy-10942-postgres-filter-implement-postgres-ssl-termination-and-monitoring",
4+
"missionClass": "solution",
5+
"author": "KubeStellar Bot",
6+
"authorGithub": "kubestellar",
7+
"mission": {
8+
"title": "envoy: Postgres filter: implement Postgres SSL termination and monitoring",
9+
"description": "Postgres filter: implement Postgres SSL termination and monitoring. Requested by 14+ users.",
10+
"type": "feature",
11+
"status": "completed",
12+
"steps": [
13+
{
14+
"title": "Check current envoy deployment",
15+
"description": "Verify your envoy version and configuration:\n```bash\nkubectl get pods -n envoy -l app.kubernetes.io/name=envoy\nhelm list -n envoy 2>/dev/null || echo \"Not installed via Helm\"\n```\nThis feature requires a working envoy installation."
16+
},
17+
{
18+
"title": "Review envoy configuration",
19+
"description": "Inspect the relevant envoy configuration:\n```bash\nkubectl get all -n envoy -l app.kubernetes.io/name=envoy\nkubectl get configmap -n envoy -l app.kubernetes.io/part-of=envoy\n```\nEncrypting the communications with the database is a hard requirement in many environments. And while cryptography is currently very fast on modern hardware, it still imposes some penalty where it is executed."
20+
},
21+
{
22+
"title": "Apply the fix for Postgres filter: implement Postgres SSL termination and…",
23+
"description": "Commit Message:\nAdds ability to use _starttls_ transport socket to terminate SSL at Envoy and pass unencrypted traffic upstream to Postgres server.\n\nAdditional Description:\nRisk Level: Low\nTesting: Added unit and integration tests.\nDocs Changes: Yes.\nRelease Notes: Yes.\n```yaml\ntls_context:\n common_tls_context:\n tls_certificates:\n - certificate_chain:\n filename: \"/etc/example-com.crt\"\n private_key:\n filename: \"/etc/example-com.key\"\n```"
24+
},
25+
{
26+
"title": "Verify the feature works",
27+
"description": "Test that the new capability is working as expected:\n```bash\nkubectl get pods -n envoy -l app.kubernetes.io/name=envoy\nkubectl get events -n envoy --sort-by='.lastTimestamp' | tail -10\n```\nConfirm the feature described in \"Postgres filter: implement Postgres SSL termination and…\" is functioning correctly."
28+
}
29+
],
30+
"resolution": {
31+
"summary": "Commit Message:\nAdds ability to use _starttls_ transport socket to terminate SSL at Envoy and pass unencrypted traffic upstream to Postgres server.\n\nAdditional Description:\nRisk Level: Low\nTesting: Added unit and integration tests.\nDocs Changes: Yes.\nRelease Notes: Yes.",
32+
"codeSnippets": [
33+
"tls_context:\n common_tls_context:\n tls_certificates:\n - certificate_chain:\n filename: \"/etc/example-com.crt\"\n private_key:\n filename: \"/etc/example-com.key\""
34+
]
35+
}
36+
},
37+
"metadata": {
38+
"tags": [
39+
"envoy",
40+
"graduated",
41+
"networking",
42+
"feature"
43+
],
44+
"cncfProjects": [
45+
"envoy"
46+
],
47+
"targetResourceKinds": [
48+
"Pod"
49+
],
50+
"difficulty": "intermediate",
51+
"issueTypes": [
52+
"feature"
53+
],
54+
"maturity": "graduated",
55+
"sourceUrls": {
56+
"issue": "https://github.com/envoyproxy/envoy/issues/10942",
57+
"repo": "https://github.com/envoyproxy/envoy",
58+
"pr": "https://github.com/envoyproxy/envoy/pull/14634"
59+
},
60+
"reactions": 14,
61+
"comments": 15,
62+
"synthesizedBy": "copilot"
63+
},
64+
"prerequisites": {
65+
"kubernetes": ">=1.24",
66+
"tools": [
67+
"kubectl"
68+
],
69+
"description": "A running Kubernetes cluster with envoy installed or the issue environment reproducible."
70+
},
71+
"security": {
72+
"scannedAt": "2026-03-24T06:28:37.246Z",
73+
"scannerVersion": "cncf-gen-3.0.0",
74+
"sanitized": true,
75+
"findings": []
76+
}
77+
}

0 commit comments

Comments
 (0)