-
Notifications
You must be signed in to change notification settings - Fork 360
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: outlier detection disabled by default #4856
Conversation
hey @lsjostro can you sign your commit/ commit amend and force push |
can you also add a note in https://github.com/envoyproxy/gateway/blob/main/release-notes/current.yaml under the breaking changes section highlighting that this now disabled by default and If needed, needs to be explicitly set in https://gateway.envoyproxy.io/docs/api/extension_types/#backendtrafficpolicy |
b132c05
to
eee4f8d
Compare
for ref 😄 martinvonz/jj#1399 |
864338f
to
5ebc7aa
Compare
While I agree that passive health checks does not make sense when EG is used as the first tier of a proxy chain, I believe they can be beneficial in most scenarios where EG sits directly in front of services. Considering this, I see two potential approaches:
Personally, I lean slightly toward the first option, as it provides a more resilient out-of-the-box experience. My above assumptions may not be correct, I’d like to hear more practical opinions from users who are actively using EG in their environments. |
If 1. is picked, a user setting active health will need to explicitly disable passive health check |
Yeah, that's a good point. An implicit health check could be hard to be noticed. We can go ahead with option 2 and add a best practices section in the documentation to ask users to set it if needed. |
agree option 2 is better otherwise we'll need to document why we choose to enable passive health by default and how that will benefit the user. I think it's better to let the user decide and don't have something enabled saying we know better than the user. |
6988622
to
5e71298
Compare
hey @lsjostro can you run |
Passive health check need to explicitly enabled by a BackendTrafficPolicy Signed-off-by: Lars Sjöström <[email protected]>
5e71298
to
80c4548
Compare
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## main #4856 +/- ##
=======================================
Coverage 66.29% 66.30%
=======================================
Files 209 209
Lines 31912 31955 +43
=======================================
+ Hits 21157 21188 +31
- Misses 9507 9519 +12
Partials 1248 1248 ☔ View full report in Codecov by Sentry. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM thanks !
the scan failure seems unrelated to this PR
What type of PR is this?
What this PR does / why we need it:
disable passive health check if not explicitly enabled by a BTP. It's misleading for users that passive health check is enabled with default values without user knowing.
Use case where you don't need outlier detection:
If you users have tiers of proxies (envoy have clusters backends which is also proxies), outlier detection shouldn't be enabled.
Which issue(s) this PR fixes:
Fixes #4854
Release Notes: No