-
Notifications
You must be signed in to change notification settings - Fork 688
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bump Envoy to v1.20.1 #4075
Bump Envoy to v1.20.1 #4075
Conversation
Not sure if we want to merge for 1.19 or not cc @projectcontour/maintainers |
Codecov Report
@@ Coverage Diff @@
## main #4075 +/- ##
==========================================
+ Coverage 76.41% 76.52% +0.10%
==========================================
Files 111 111
Lines 9883 9869 -14
==========================================
Hits 7552 7552
+ Misses 2164 2150 -14
Partials 167 167
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
👍 I don't see any reason not to ship it in Contour 1.19.
Should update the compat matrix and versions.yaml as well |
looks like a few e2e tests not passing submitted #4080 so we get a proper failure rather than a panic, but looks like some requests never succeeding in tests |
added |
I tried running on my machine and seems like some tests are timing out. 🤔 |
yeah latest CI runs ~140s for the |
just switching back to the older Envoy, I get ~140s locally for the |
seemingly a lot of TLS handshake timeouts and stalling the tests when we're making requests, might also adjust the test suite to use an http client that has some more strict timeouts but its pretty black and white switching back to Envoy 1.19.1 with no changes to the tests, these issues go away (the other code changes in the PR are kept in, just changing the Envoy image) |
With a git bisect, was able to find this commit as the Envoy culprit: envoyproxy/envoy@ba474ac |
adding some logging to our test suite, you can see the holdup is in waiting for requests to succeed after we program an HTTPProxy etc. there aren't connection refused errors in the slow tests but rather TLS handshake timeouts, I assume as listeners/filter chains/worker threads are spun up and torn down with the new logic that was introduced; it appears connections are still accepted by Envoy but the new slowness is maybe a mixture of our tests initiating a connection before worker threads have properly been initialized and these connections being held open waiting for a response that will never come our tests dont currently have a request timeout/they use the default go http client which has no HTTP request timeout and only has the default TLS handshake timeout from the default TLS transport so adding a timeout there should help |
testing with image |
looks like that passed ^ We'll have to wait for the linked change to be backported to Envoy 1.20.x |
f1d8c2e
to
7b38e9a
Compare
@sunjayBhatia could you fix the PR title? Thx! |
Marking this PR stale since there has been no activity for 14 days. It will be closed if there is no activity for another 30 days. |
See release notes: https://www.envoyproxy.io/docs/envoy/v1.20.0/version_history/current Also bumps go-control-plane to latest Deprecation of existing headermatch usage will need to be handled in the release after this is merged. The "string match" header matching method is preferred but was added in 1.20.0 and it was not present in 1.19.x, we will need to release a version with Envoy 1.20.0 compatibility and the subsequent release will need to move to the "string match" method (rather than the individual regex/exact/etc. methods. Signed-off-by: Sunjay Bhatia <sunjayb@vmware.com>
Signed-off-by: Sunjay Bhatia <sunjayb@vmware.com>
Signed-off-by: Sunjay Bhatia <sunjayb@vmware.com>
Signed-off-by: Sunjay Bhatia <sunjayb@vmware.com>
Signed-off-by: Sunjay Bhatia <sunjayb@vmware.com>
Signed-off-by: Sunjay Bhatia <sunjayb@vmware.com>
7b38e9a
to
4a5a4b3
Compare
Signed-off-by: Sunjay Bhatia <sunjayb@vmware.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🎉
See release notes:
https://www.envoyproxy.io/docs/envoy/v1.20.0/version_history/current
Also bumps go-control-plane to latest
Deprecation of existing headermatch usage will need to be handled in the release after this is
merged. The "string match" header matching method is preferred but was
added in 1.20.1 and it was not present in 1.19.x, we will need to
release a version with Envoy 1.20.x compatibility and the subsequent
release will need to move to the "string match" method (rather than the
individual regex/exact/etc. methods.