This guide demonstrates how to configure circuit breaking for destinations that are external to the OSM managed service mesh.
Prerequisites
- Kubernetes cluster running Kubernetes v1.22.9 or greater.
- Have OSM installed.
- Have
kubectl
available to interact with the API server. - Have
osm
CLI available for managing the service mesh. - OSM version >= v1.1.0.
Demo
The following demo shows a load-testing client fortio sending traffic to the httpbin
service that is external to the service mesh. Traffic external to the mesh is treated as Egress traffic, and will be authorized using an Egress traffic policy. We will see how applying circuit breakers for traffic to the external httpbin
service impacts the fortio
client when the configured circuit breaking limits trip.
-
Deploy the
httpbin
service into thehttpbin
namespace. Thehttpbin
service runs on port14001
and is not added to the mesh, so it is considered to be a destination external to the mesh.Confirm the
httpbin
service and pods are up and running. -
Deploy the
fortio
load-testing client in theclient
namespace after enrolling its namespace to the mesh.Confirm the
fortio
client pod is up and running. -
Configure an Egress policy that allows the
fortio
client in theclient
namespace to communicate with the externalhttpbin
service. The HTTP requests will be directed to the hosthttpbin.httpbin.svc.cluster.local
on port14001
. -
Confirm the
fortio
client is able to successfully make HTTP requests to the external hosthttpbin.httpbin.svc.cluster.local
service on port14001
. We call the external service with5
concurrent connections (-c 5
) and send50
requests (-n 50
).As seen above, all the requests succeeded.
Code 200 : 50 (100.0 %)
-
Next, apply a circuit breaker configuration using the
UpstreamTrafficSetting
resource for traffic directed to the external hosthttpbin.httpbin.svc.cluster.local
to limit the maximum number of concurrent connections and requests to1
. When applying anUpstreamTrafficSetting
configuration for external (egress) traffic, theUpstreamTrafficSetting
resource must also be specified as a match in theEgress
configuration and belong to the same namespace as the matchingEgress
resource. This is required to enforce circuit breaking limits for external traffic. Hence, we also update the previously appliedEgress
configuration to specify amatches
field. -
Confirm the
fortio
client is unable to make the same amount of successful requests as before due to the connection and request level circuit breaking limits configured above.As seen above, only 58% of the requests succeeded, and the rest failed when the circuit breaker tripped.
Code 200 : 29 (58.0 %) Code 503 : 21 (42.0 %)
-
Examine the
Envoy
sidecar stats to see statistics pertaining to the requests that tripped the circuit breaker.cluster.httpbin_httpbin_svc_cluster_local_14001.upstream_rq_pending_overflow: 21
indicates that 21 requests tripped the circuit breaker, which matches the number of failed requests seen in the previous step:Code 200 : 29 (58.0 %)
.
Feedback
Was this page helpful?
Glad to hear it! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.