-
Notifications
You must be signed in to change notification settings - Fork 276
feat(injector): Set probe timeouts based on pod deployment spec #4149
Conversation
Creating as draft to make sure that lint passes, because it timeouts on my devbox |
Codecov Report
@@ Coverage Diff @@
## main #4149 +/- ##
==========================================
+ Coverage 69.47% 69.81% +0.34%
==========================================
Files 210 212 +2
Lines 11423 11579 +156
==========================================
+ Hits 7936 8084 +148
- Misses 3434 3442 +8
Partials 53 53
Flags with carried forward coverage won't be shown. Click here to find out more.
Continue to review full report at Codecov.
|
1397512
to
5376e77
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@davinci26 Thanks for addressing the issue based on our discussion. This change looks good, except that the commit and PR description is misleading (references to idle_timeout). Could you please address this, looks good otherwise.
Fixes openservicemesh#4137 Overall we aim to maintain the following invariance: For all health probes we want the following to be true: All Envoy (implicit or explicit) timeouts >= the timeout specified in the pod deployment spec. Changes: * Remove connect timeouts from all clusters * For health probe clusters we set the route timeout to be equal to the timeout set on the kubernetes pod. This is only applied on HTTP routes since plain tcp routes have infinite timeout. Signed-off-by: Sotiris Nanopoulos <[email protected]>
5376e77
to
4406dc5
Compare
@shashankram fixed. Thanks for the feedback on this PR offline, highly appreciate it! |
…servicemesh#4149) Fixes openservicemesh#4137 Overall we aim to maintain the following invariance: For all health probes we want the following to be true: All Envoy (implicit or explicit) timeouts >= the timeout specified in the pod deployment spec. Changes: * Remove connect timeouts from all clusters * For health probe clusters we set the route timeout to be equal to the timeout set on the kubernetes pod. This is only applied on HTTP routes since plain tcp routes have infinite timeout. Signed-off-by: Sotiris Nanopoulos <[email protected]>
…servicemesh#4149) Fixes openservicemesh#4137 Overall we aim to maintain the following invariance: For all health probes we want the following to be true: All Envoy (implicit or explicit) timeouts >= the timeout specified in the pod deployment spec. Changes: * Remove connect timeouts from all clusters * For health probe clusters we set the route timeout to be equal to the timeout set on the kubernetes pod. This is only applied on HTTP routes since plain tcp routes have infinite timeout. Signed-off-by: Sotiris Nanopoulos <[email protected]> Signed-off-by: Sneha Chhabria <[email protected]>
…servicemesh#4149) Fixes openservicemesh#4137 Overall we aim to maintain the following invariance: For all health probes we want the following to be true: All Envoy (implicit or explicit) timeouts >= the timeout specified in the pod deployment spec. Changes: * Remove connect timeouts from all clusters * For health probe clusters we set the route timeout to be equal to the timeout set on the kubernetes pod. This is only applied on HTTP routes since plain tcp routes have infinite timeout. Signed-off-by: Sotiris Nanopoulos <[email protected]>
Fixes #4137
Overall we aim to maintain the following invariance:
For all health probes we want the following to be true:
All Envoy (implicit or explicit) timeouts >= the timeout specified in
the pod deployment spec.
Changes:
timeout set on the kubernetes pod. This is only applied on HTTP routes
since plain tcp routes have infinite timeout.
Signed-off-by: Sotiris Nanopoulos [email protected]
Description:
Testing done:
Affected area:
Please answer the following questions with yes/no.
Does this change contain code from or inspired by another project?
Is this a breaking change?