-
Notifications
You must be signed in to change notification settings - Fork 94
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
GSLB does not consider gateway or Ingress controller failure in multi-cluster setup #1754
Comments
Thank you for creating an issue @altieresfreitas |
Thank you for the confirmation, @abaguas. I’m glad to hear that this feature aligns with previous discussions. I’d be interested in contributing to its development. Could I get the assignment for this issue? I’d be happy to start working on a PR to implement it. |
That is great, we appreciate your initiative! Here is my implementation proposal:
Overall the structure of the code is:
If you have any questions or suggestion let me know. Looking forward to your PR! |
In a multi-cluster setup, k8gb currently determines whether an IP should be added to DNS based on the health of application pods tied to a specified service. However, this does not account for the health of centralized routing components like gateways (e.g., Istio Gateway) or Ingress controllers.
During local testing, I observed that k8gb did not remove the IP for a data center where the gateway or Ingress controller was scaled down to zero. It appears that k8gb doesn’t currently consider the health of these routing components in its failover decisions.
Would it be possible to enhance k8gb to include health checks for both the gateway or Ingress controller and the application pods? This could improve the accuracy of failover responses in scenarios where the availability of these routing components directly impacts traffic distribution across clusters.
The text was updated successfully, but these errors were encountered: