You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Currently working on a use case using EKS, Istio, and Flagger to manage canary deployments. We have a requirement to restrict cross-AZ traffic, so we have implemented locality-based routing in Istio.
However, when creating a canary deployment with Flagger, it does not appear to respect the destination rule configured for locality-based routing. This results in traffic routing across availability zones, which we aim to avoid.
Is this behavior expected, or is this a feature that is not currently supported? Any guidance or suggested workarounds would be appreciated.
Describe the bug
Currently working on a use case using EKS, Istio, and Flagger to manage canary deployments. We have a requirement to restrict cross-AZ traffic, so we have implemented locality-based routing in Istio.
However, when creating a canary deployment with Flagger, it does not appear to respect the destination rule configured for locality-based routing. This results in traffic routing across availability zones, which we aim to avoid.
Is this behavior expected, or is this a feature that is not currently supported? Any guidance or suggested workarounds would be appreciated.
Below are the config file
gateway.yaml
virutal-service.yaml
destination-rule.yaml
canary-deploy.yaml
To Reproduce
If you deploy the above canary object it creates the virtual-service like this
And 2 destination rules one for primary and other one for canary
This shows that its not respecting the existing destination rules.
Expected behavior
The canary deployment should respect the destination rule for locality-based routing, keeping traffic within the specified availability zones.
Additional context
The text was updated successfully, but these errors were encountered: