Replies: 1 comment
-
Update: Bottom line, we have no awareness of new pods. This is the same behavior we witnessed with just using K8s's default load balancing mechanism, which is L4-based and therefore not suitable for HTTP/2, so I assume that the proxy is not doing anything here for some reason. |
Beta Was this translation helpful? Give feedback.
-
Hi,
I'm trying to use Linkerd to achieve functional gRPC load-balancing with pod scaling awareness in my cluster.
Basically I have an Envoy pod that leverages an HTTP filter to send out calls to a cluster-local gRPC service. Currently, even with Linkerd installed and my cluster fully meshed, only one gRPC server pod seems to receive and handle the calls sent out from Envoy.
The configuration on Envoy's side is as follows:
The
initial_metadata
section is supposed to inject thel5d-dst-override
custom header to every initial gRPC request sent out by the client, as required by Linkerd. The metadata key-value pairs are implemented as HTTP/2 headers, so logically it should be working.My only theory is that Envoy will have to communicate with the target gRPC service via non-secure HTTP/2 for that to work, based on this quote:
But unfortunately, my target gRPC service does not support non-secure connections.
Kubernetes version:
Linkerd version:
linkerd check
output:Any ideas what could be missing?
Thanks!
Beta Was this translation helpful? Give feedback.
All reactions