-
Notifications
You must be signed in to change notification settings - Fork 216
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Envoy] Envoy proxy healthchecks #922
Comments
New info: Adding envoy proxy liveness check. With this new functionality when the envoy stops accepting TCP connections the health check will fail and the app will be restarted. The changes were tested on test environment and it is visible that there are 3 envoy TCP liveness healthchecks: The setup we tested was on our environment with the newly implemented envoy liveness check and iptable rule on the container side to drop everything with destination port 61001(envoy), which causes timeout on gorouter side.
After the execution of the iptable rule on the container which drop destination port 61001 we've received the correct error message and then the app was restarted. Which proves that the newly implemented logic is working: Feedback is highly appreciated. |
Hi @Viktor-Velkov, Please provide more information:
If you would use port health check type your application should be restarted if it fails to accept connection on that port. |
Hi @mariash, Sorry for the late response, but we had to test one more functionality in regards communication between app and the envoy proxy.
|
BTW: @Viktor-Velkov I just noticed that we are adding a new spec property. Make sure you add this property to windows spec file as well. |
I totally forgot about rep_windows properties! I will add them and test the changes. |
All done. The tests are passing and the two changes in regards two rep_windows are already into the PR which is linked into the issue. |
Envoy proxy healthchecks
Summary
In the past we have observed cases, where an application is running, but does not accept any connections. When we looked into it, the app healthcheck was passing and the envoy proxy was running as well, but no requests were reaching the app. This leads to this loop:
This is why we started to look into potential ways to do some sort of healthchecking on the proxy. The best option we currently see is modifying the app healthcheck in a way that also checks the proxy. Currently it uses only the app port. We can add a parallel check that also does the same trough the proxy port. The proxy will then redirect the request to the app and we will receive a response. This of course means two times more healthchecking requests to the app, but this should not have any significant impact.
Of course this extra check functionality could be enabled with a flag in the executor, so it can be used only if needed.
Please let me know what you think on the topic. I think this topic has been discussed in the past and maybe someone could give some context why it was never implemented.
Diego repo
https://github.com/cloudfoundry/executor
https://github.com/cloudfoundry/healthcheck
The text was updated successfully, but these errors were encountered: