-
Notifications
You must be signed in to change notification settings - Fork 688
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Get upstream_connection_options configurable to do workaround for the flaky behavior of envoy #3214
Comments
In general, we try not to just lift and copy Envoy structs into HTTPProxy, for three reasons:
That said, we already set TCP keepalives for the listener itself (see #2633 and #2652 for greater configurability of it), but we don't currently for the upstream. I think that adding TCP keepalive configurability to the upstreams seems to make sense, and we could probably reuse the same keepalive configuration struct for the listener as well, which would help with #2652. |
This change allows users to tune envoy's keepalive settings. Fixes projectcontour#2652 Fixes projectcontour#3214 Signed-off-by: binoue <banji-inoue@cybozu.co.jp>
This change allows users to tune envoy's keepalive settings. Fixes projectcontour#2652 Fixes projectcontour#3214 Signed-off-by: binoue <banji-inoue@cybozu.co.jp>
…ettings This change allows users to tune envoy's keepalive settings. Fixes projectcontour#2652 Fixes projectcontour#3214 Signed-off-by: binoue <banji-inoue@cybozu.co.jp>
This change allows users to tune envoy's keepalive settings. Fixes projectcontour#2652 Fixes projectcontour#3214 Signed-off-by: binoue <banji-inoue@cybozu.co.jp>
The Contour project currently lacks enough contributors to adequately respond to all Issues. This bot triages Issues according to the following rules:
You can:
Please send feedback to the #contour channel in the Kubernetes Slack |
The Contour project currently lacks enough contributors to adequately respond to all Issues. This bot triages Issues according to the following rules:
You can:
Please send feedback to the #contour channel in the Kubernetes Slack |
I deployed a Golang HTTP client that makes HTTP requests periodically, about once every 10 seconds, to L7 endpoints which are exposed with envoy. This is done to check if the endpoints are alive as end-to-end testing.
While running it, I experienced the same error as reported in the issue about envoy.
This comment says that the error has something to do with keepalive, and this comment says that this issue is actually solved by configuring the
tcp_keepalive
underupstream_connection_options
.I think it's better to get the
upstream_connection_options
fields configurable because some developers seem to have faced this issue.Any thoughts on this?
The text was updated successfully, but these errors were encountered: