Traefik Enterprise Practice: TraefikService

Traefik Enterprise Practice: TraefikService

Introduction

The routing rules of traefik can implement basic load balancing operations at Layer 4 and Layer 7, using IngressRoute, IngressRouteTCP, and IngressRouteUDP resources. However, if you want to implement advanced operations such as weighted round-robin and traffic replication, traefik abstracts a TraefikService resource. At this time, the overall traffic flow is as follows: external traffic first enters traefik through the entryPoints port, and then enters TraefikService after being matched by IngressRoute/IngressRouteTCP/IngressRouteUDP, and weighted round-robin and traffic replication are implemented at the TraefikService layer, and finally the request is forwarded to the kubernetes service.

Create a Demo Application

app-v1.yaml:

 apiVersion: apps/v1 kind: Deployment metadata: name: app-v1 spec: replicas: 1 selector: matchLabels: app: app-v1 template: metadata: labels: app: app-v1 spec: containers: - name: app-v1 image: nginx:latest lifecycle: postStart: exec: command: ["/bin/sh", "-c", "echo Hello app-v1 > /usr/share/nginx/html/index.html"] ports: - containerPort: 80 resources: requests: cpu: 100m memory: 128Mi limits: cpu: 200m memory: 256Mi --- apiVersion: v1 kind: Service metadata: name: app-v1 spec: selector: app: app-v1 ports: - name: http port: 80 targetPort: 80 type: ClusterIP

app-v2.yaml:

 apiVersion: apps/v1 kind: Deployment metadata: name: app-v2 spec: replicas: 1 selector: matchLabels: app: app-v2 template: metadata: labels: app: app-v2 spec: containers: - name: app-v2 image: nginx:latest lifecycle: postStart: exec: command: ["/bin/sh", "-c", "echo Hello app-v2 > /usr/share/nginx/html/index.html"] ports: - containerPort: 80 resources: requests: cpu: 100m memory: 128Mi limits: cpu: 200m memory: 256Mi --- apiVersion: v1 kind: Service metadata: name: app-v2 spec: selector: app: app-v2 ports: - name: http port: 80 targetPort: 80 type: ClusterIP

deploy

 [root@localhost traefik]# kubectl apply -f app-v1.yaml deployment.apps/app-v1 created service/app-v1 created [root@localhost traefik]# kubectl apply -f app-v2.yaml deployment.apps/app-v2 created service/app-v2 created [root@localhost traefik]# kubectl get pod,svc NAME READY STATUS RESTARTS AGE pod/app-v1-579dbbb754-nwtzw 1/1 Running 0 2m23s pod/app-v2-7f7844f7b9-grsdk 1/1 Running 0 2m19s NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE service/app-v1 ClusterIP 10.100.10.94 <none> 80/TCP 2m23s service/app-v2 ClusterIP 10.104.145.150 <none> 80/TCP 2m18s

Grayscale release (weighted round-robin)

Grayscale release is also called canary release. It allows some services that are about to be launched to be released online to observe whether they meet the requirements for online release. It is mainly achieved through weighted polling. Create traefikService and inressRoute resources to implement wrr weighted polling app-traefikService-ingressroute-wrr.yaml:

 apiVersion: traefik.containo.us/v1alpha1 kind: IngressRoute metadata: name: app-ingressroute-wrr namespace: default spec: entryPoints: - web routes: - match: Host(`traefikservice-wrr.kubesre.lc`) kind: Rule services: - name: wrr namespace: default kind: TraefikService --- apiVersion: traefik.containo.us/v1alpha1 kind: TraefikService metadata: name: wrr namespace: default spec: weighted: services: - name: app-v1 port: 80 weight: 1 # 定义权重kind: Service # 可选,默认就是Service - name: app-v2 port: 80 weight: 2

deploy

 [root@localhost traefik]# kubectl apply -f app-traefikService-ingressroute-wrr.yaml ingressroute.traefik.containo.us/app-ingressroute-wrr created traefikservice.traefik.containo.us/wrr created [root@localhost traefik]# kubectl get ingressroute NAME AGE app-ingressroute-wrr 6s [root@localhost traefik]# kubectl get TraefikService NAME AGE wrr 3m42s

Add local hosts resolution

 192.168.36.139 traefikservice-wrr.kubesre.lcc

The test results are as follows:

 [root@localhost traefik]# for i in {1..9}; do curl http://traefikservice-wrr.kubesre.lc && sleep 1; done Hello app-v1 Hello app-v2 Hello app-v2 Hello app-v1 Hello app-v2 Hello app-v2 Hello app-v1 Hello app-v2 Hello app-v2

Session persistence (sticky sessions)

When we use traefik's load balancing, multiple k8s service services are round-robin by default. If a user makes multiple requests for the same content, they may be forwarded to different backend servers. Suppose a user sends a request and is assigned to server A, and some information is saved in the session. The user sends a request again and is assigned to server B. To use the previously saved information, if there is no session stickiness between servers A and B, server B cannot get the previous information, which will cause some problems. Traefik also supports sticky sessions, which allows all user requests within a session cycle to always be forwarded to a specific backend server. Create traefikervie and inressRoute to implement cookie-based session persistence app-traefikService-ingressroute-cookie.yaml:

 apiVersion: traefik.containo.us/v1alpha1 kind: IngressRoute metadata: name: app-ingressroute-cokie namespace: default spec: entryPoints: - web routes: - match: Host(`traefikservice-cokie.kubesre.lc`) kind: Rule services: - name: cokie namespace: default kind: TraefikService --- apiVersion: traefik.containo.us/v1alpha1 kind: TraefikService metadata: name: cokie namespace: default spec: weighted: services: - name: app-v1 port: 80 weight: 1 # 定义权重- name: app-v2 port: 80 weight: 2 sticky: # 开启粘性会话cookie: # 基于cookie区分客户端name: cookie # 指定客户端请求时,包含的cookie名称

deploy

 [root@localhost traefik]# kubectl apply -f app-traefikService-ingressroute-cokie.yaml ingressroute.traefik.containo.us/app-ingressroute-cokie created traefikservice.traefik.containo.us/cokie created [root@localhost traefik]# kubectl get ingressroute NAME AGE app-ingressroute-cokie 5s [root@localhost traefik]# kubectl get TraefikService NAME AGE cokie 8s

Add local hosts resolution

 192.168.36.139 traefikservice-cokie.kubesre.lcc

Client access test, carrying cookies

 [root@localhost traefik]# for i in {1..5}; do curl -b "cookie=default-app-v1-80" http://traefikservice-cokie.kubesre.lc/; done Hello app-v1 Hello app-v1 Hello app-v1 Hello app-v1 Hello app-v1 [root@localhost traefik]# for i in {1..5}; do curl -b "cookie=default-app-v2-80" http://traefikservice-cokie.kubesre.lc/; done Hello app-v2 Hello app-v2 Hello app-v2 Hello app-v2 Hello app-v2

Traffic replication

The so-called traffic replication, also known as mirroring service, refers to copying the requested traffic according to the rules and sending it to other services, and ignoring the responses to these requests. This function is very useful when doing some stress testing or problem reproduction. Create traefikService and ingressRoute app-traefikService-ingressroute-copy.yaml:

 apiVersion: traefik.containo.us/v1alpha1 kind: IngressRoute metadata: name: app-ingressroute-copy namespace: default spec: entryPoints: - web routes: - match: Host(`traefikservice-copy.kubesre.lc`) kind: Rule services: - name: copy namespace: default kind: TraefikService --- apiVersion: traefik.containo.us/v1alpha1 kind: TraefikService metadata: name: copy namespace: default spec: mirroring: name: app-v1 # 发送100% 的请求到app-v1 port: 80 mirrors: - name: app-v2 # 然后复制10% 的请求到app-v2 port: 80 percent: 10

deploy

 [root@localhost traefik]# kubectl apply -f app-traefikService-ingressroute-copy.yaml ingressroute.traefik.containo.us/app-ingressroute-copy created traefikservice.traefik.containo.us/copy created [root@localhost traefik]# kubectl get ingressroute NAME AGE app-ingressroute-copy 7s [root@localhost traefik]# kubectl get TraefikService NAME AGE copy 13s

Add local hosts resolution

 192.168.36.139 traefikservice-copy.kubesre.lc

The test results are as follows: Only the return information of app-v1 can be seen.

 [root@localhost traefik]# for i in {1..9}; do curl http://traefikservice-copy.kubesre.lc && sleep 1; done Hello app-v1 Hello app-v1 Hello app-v1 Hello app-v1 Hello app-v1 Hello app-v1 Hello app-v1 Hello app-v1 Hello app-v1

Check the pod log of app-v2 and find that 10% of the traffic requests will come in.

 [root@localhost traefik]# kubectl logs -f app-v2-7f7844f7b9-grsdk ... 10.244.0.5 - - [23/Aug/2023:02:54:36 +0000] "GET / HTTP/1.1" 200 13 "-" "curl/7.29.0" "10.244.0.1"

<<:  Web3.0 Technology: Unlocking the Future of the Internet

>>:  ​In-depth analysis of computer networks and operating systems: essential knowledge analysis for interviews

Recommend

When 5G meets new infrastructure, how will edge computing develop?

Edge computing has become one of the hottest tech...

Building the future of intelligent networks at the edge

Edge computing is evolving and is the future of b...

Charter to spend $442 million to boost broadband coverage

Charter Communications Inc, which provides intern...

Huawei Cloud: Enterprise-level cloud host 2C4G5M 707 yuan/year

Huawei Cloud's various activities are also on...

[Closed] NextArray: $1.09/month KVM-1GB/10GB/1TB/Dallas Data Center

[Closed] NextArray is a foreign hosting company fo...

Which collaboration metrics determine the business value of an application?

The criteria for evaluating the business value of...

Network programming - starting from establishing a TCP connection

[[388071]] Preface Network programming is somethi...

Make the network run autonomously like a driverless car

[51CTO.com original article] Juniper Networks Glo...