-
Notifications
You must be signed in to change notification settings - Fork 4.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
xds: don't attempt to load-balance sessions for local proxies #15789
Merged
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
boxofrad
added
the
backport-inactive/1.14
This release series is no longer active
label
Dec 14, 2022
github-actions
bot
added
theme/agent-cache
Agent Cache
theme/connect
Anything related to Consul Connect, Service Mesh, Side Car Proxies
theme/envoy/xds
Related to Envoy support
labels
Dec 14, 2022
boxofrad
force-pushed
the
boxofrad/bugfix-server-local-limit
branch
from
December 14, 2022 16:28
e1f73a3
to
5ce183d
Compare
rboyer
reviewed
Dec 14, 2022
boxofrad
force-pushed
the
boxofrad/bugfix-server-local-limit
branch
from
January 4, 2023 13:53
2527368
to
d66663f
Compare
The latest updates on your projects. Learn more about Vercel for Git ↗︎
|
boxofrad
force-pushed
the
boxofrad/bugfix-server-local-limit
branch
from
January 5, 2023 10:29
5240ae7
to
8679e2c
Compare
Previously, we'd begin a session with the xDS concurrency limiter regardless of whether the proxy was registered in the catalog or in the server's local agent state. This caused problems for users who run `consul connect envoy` directly against a server rather than a client agent, as the server's locally registered proxies wouldn't be included in the limiter's capacity. Now, the `ConfigSource` is responsible for beginning the session and we only do so for services in the catalog. Fixes: #15753
boxofrad
force-pushed
the
boxofrad/bugfix-server-local-limit
branch
from
January 9, 2023 10:52
8679e2c
to
d19960c
Compare
Hey @rboyer 👋🏻 I've fixed CI and the missing |
rboyer
approved these changes
Jan 18, 2023
boxofrad
added a commit
that referenced
this pull request
Jan 18, 2023
Previously, we'd begin a session with the xDS concurrency limiter regardless of whether the proxy was registered in the catalog or in the server's local agent state. This caused problems for users who run `consul connect envoy` directly against a server rather than a client agent, as the server's locally registered proxies wouldn't be included in the limiter's capacity. Now, the `ConfigSource` is responsible for beginning the session and we only do so for services in the catalog. Fixes: #15753
boxofrad
added a commit
that referenced
this pull request
Jan 19, 2023
#16004) Previously, we'd begin a session with the xDS concurrency limiter regardless of whether the proxy was registered in the catalog or in the server's local agent state. This caused problems for users who run `consul connect envoy` directly against a server rather than a client agent, as the server's locally registered proxies wouldn't be included in the limiter's capacity. Now, the `ConfigSource` is responsible for beginning the session and we only do so for services in the catalog. Fixes: #15753 Co-authored-by: Dan Upton <daniel@floppy.co>
skpratt
pushed a commit
that referenced
this pull request
Jan 25, 2023
Previously, we'd begin a session with the xDS concurrency limiter regardless of whether the proxy was registered in the catalog or in the server's local agent state. This caused problems for users who run `consul connect envoy` directly against a server rather than a client agent, as the server's locally registered proxies wouldn't be included in the limiter's capacity. Now, the `ConfigSource` is responsible for beginning the session and we only do so for services in the catalog. Fixes: #15753
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
backport-inactive/1.14
This release series is no longer active
theme/agent-cache
Agent Cache
theme/connect
Anything related to Consul Connect, Service Mesh, Side Car Proxies
theme/envoy/xds
Related to Envoy support
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Description
Previously, we'd begin a session with the xDS concurrency limiter regardless of whether the proxy was registered in the catalog or in the server's local agent state.
This caused problems for users who run
consul connect envoy
directly against a server rather than a client agent, as the server's locally registered proxies wouldn't be included in the limiter's capacity.Now, the
ConfigSource
is responsible for beginning the session and we only do so for services in the catalog (bypassing the limiter for locally-registered proxies).Fixes: #15753
Also upgrades mockery to v2.15.0, as this was required to regenerate the mocks on Go 1.19.
Testing & Reproduction steps
consul connect envoy
for each proxy.