Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support proxy canary in Envoy gateway #4494

Open
nezdolik opened this issue Oct 22, 2024 · 2 comments
Open

Support proxy canary in Envoy gateway #4494

nezdolik opened this issue Oct 22, 2024 · 2 comments
Labels

Comments

@nezdolik
Copy link
Member

nezdolik commented Oct 22, 2024

Description:
It would beneficial for users to be able to rollout proxy config change to canary service first prior to wide fleet rollout. EG could be managing multiple envoyproxy services (stable and canary) without resource duplications (users dont need to explicitly configure & duplicate resources for canary gateway class, gateway, envoyproxy config etc). Another idea is to have both canary EG (control plane) service talking to canary envoyproxies and stable EG+envoyproxies and deployment/rollout that progressively deploys to canary first and then to stable.

[optional Relevant Links:]

Any extra documentation required to understand the issue.

@arkodg
Copy link
Contributor

arkodg commented Oct 23, 2024

  1. Gradual rollout of xDS config into Envoy Proxy fleet when applying Gateway API config
  2. Gradual rollout of Envoy Proxy fleet versions during a version upgrade
  3. Gradual rollout of xDS config if/when Envoy Gateway version is updated (which also results in 2.)

@nezdolik are you referring to 3. ?

would also help highlight the motivation (e.g. unsure how new envoy proxy or envoy gateway will affect prod traffic) as well as any preferred workflow

@nezdolik
Copy link
Member Author

@arkodg the use case is to be able to rollout config changes as well doing version upgrades to a small subset of canary pods first (so all of them? #1, #2, #3). I have experimented with canary strategy in argo rollouts and it is not compatible with xds config propagation (config propagated to canary and stable at the same time). The motivation is reliable/safe rollouts to production.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

2 participants