linkerd2/doc/roadmap.md

2.5 KiB
Executable File
Raw Blame History

+++ title = "Conduit roadmap" docpage = true [menu.docs] parent = "roadmap" +++

This is the planned roadmap for Conduit. Of course, as with any software project (especially open source) even the best of plans change rapidly as development progresses.

Our goal is to get Conduit to production-readiness as rapidly as possible with a minimal featureset, then to build functionality out from there. Well make alpha / beta / GA designations based on actual community usage, and generally will err on the side of being overly conservative.

Status: alpha

0.4.0: Rich, Kubernetes-aware Grafana & Prometheus

2018-04-16

Visibility

  • Rich, Kubernetes-aware conduit stat:
    • Works on deployments & namespaces.
    • --from & --to flags filter stats by source & destination.
  • Proxy exposes Prometheus labeled with rich outbound stats.
  • Grafana dashboards for Kubernetes Deployments & Namespaces.

Reliability

  • The proxy properly routes egress traffic to arbitrary DNS names.

0.4.1: Rich, Kubernetes-aware debugging

Late April 2018

Visibility

  • conduit stat works on many Kubernetes resources.
    • Per-authority HTTP stats.
    • TCP-level stats
  • conduit tap works on many Kubernetes resources, too.
  • conduit wtf: what's the failure?

0.5: Stable, private communication

Mid-May 2018

Security

  • Self-bootstrapping Certificate Authority
  • Secured communication to and within the Conduit control plane
  • Automatically provide all meshed services with cryptographic identity
  • Automatically secure all meshed communication

Reliability

  • Stable Service Discovery semantics.
  • Latency-aware load balancing.

0.6: Externally accessible

Early June 2018

Routing

  • Kubernetes Ingress support

Security

  • Explicitly configured TLS for ingress
  • Server Name Indication (SNI)

Reliability

  • Scales to many cores.
  • High-availability controller
  • Circuit-breaking.

Usability

  • Helm integration

And then...

  • Mutual authentication
  • Key rotation
  • Let's Encrypt Ingress support
  • Automatic alerting for latency & success objectives
  • Controllable retry policies
  • OpenTracing integration
  • Pluggable authorization policy
  • Failure injection
  • Speculative retries
  • Dark traffic
  • gRPC payload-aware tap
  • Automated red-line testing