Files
coredns/plugin/traffic
Miek Gieben ec151309dd Implement TO
Signed-off-by: Miek Gieben <miek@miek.nl>
2020-01-16 09:16:05 +01:00
..
2020-01-16 09:00:54 +01:00
2020-01-16 09:16:05 +01:00
2020-01-16 09:16:05 +01:00
2020-01-16 09:16:05 +01:00
2020-01-16 09:16:05 +01:00
2020-01-09 17:07:22 +01:00
2020-01-16 08:47:17 +01:00

traffic

Name

traffic - handout addresses according to assignments from Envoy's xDS.

Description

The traffic plugin is a balancer that allows traffic steering, weighted responses and draining of clusters. The cluster information is retrieved from a service discovery manager that implements the service discovery protocols that Envoy implements.

A Cluster is defined as: "A cluster is a group of logically similar endpoints that Envoy connects to. Each cluster has a name, which traffic extends to be a domain name.

The use case for this plugin is when a cluster has endpoints running in multiple (Kubernetes?) clusters and you need to steer traffic to (or away) from these endpoints, i.e. endpoint A needs to be upgraded, so all traffic to it is drained. Or the entire Kubernetes needs to upgraded, and all endpoints need to be drained from it.

Traffic discovers the endpoints via Envoy's xDS protocol. Endpoints and clusters are discovered every 10 seconds. The plugin hands out responses that adhere to these assignments. Each DNS response contains a single IP address that's considered the best one. Traffic will load balance A and AAAA queries. The TTL on these answer is set to 5s.

The traffic plugin has no notion of draining, drop overload and anything that advanced, it just acts upon assignments. This is means that if a endpoint goes down and traffic has not seen a new assignment yet, it will still include this endpoint address in responses.

Syntax

traffic TO...
  • TO... are the Envoy control plane endpoint to connect to. The syntax mimics the forward plugin and must start with grpc://.

The extended syntax is available is you want more control.

traffic {
    server SERVER [SERVER]...
    node ID
 }
  • node ID is how traffic identifies itself to the control plane. This defaults to coredns.

Examples

example.org {
    traffic grpc://127.0.0.1:18000
    debug
    log
}

This will add load balancing for domains under example.org; the upstream information comes from 10.12.13.14; depending on received assignments, replies will be let through as-is or are load balanced.

Also See

The following documents provide some background on Envoy's control plane.

Bugs

Priority from ClusterLoadAssignments is not used. Locality is also not used. Health status of the endpoints is ignore (for now).

Load reporting via xDS is not supported; this can be implemented, but there are some things that make this difficult. A single (DNS) query is done by a resolver. Behind this resolver there may be many clients that will use this reply, the responding server (CoreDNS) has no idea how many clients use this resolver. So reporting a load of +1 on the CoreDNS side can be anything from 1 to 1000+, making the load reporting highly inaccurate.

Multiple TO addresses is not implemented.