Blue-Green Deployments

You are viewing documentation for a release that is no longer supported. The latest supported version of version 3 is [3.11]. For the most recent version 4, see [4]

You are viewing documentation for a release that is no longer supported. The latest supported version of version 3 is [3.11]. For the most recent version 4, see [4]

Overview

This topic serves as an alternative approach for node host upgrades to the in-place upgrade method.

The blue-green deployment upgrade method follows a similar flow to the in-place method: masters and etcd servers are still upgraded first, however a parallel environment is created for new node hosts instead of upgrading them in-place.

This method allows administrators to switch traffic from the old set of node hosts (e.g., the blue deployment) to the new set (e.g., the green deployment) after the new deployment has been verified. If a problem is detected, it is also then easy to rollback to the old deployment quickly.

While blue-green is a proven and valid strategy for deploying just about any software, there are always trade-offs. Not all environments have the same uptime requirements or the resources to properly perform blue-green deployments.

In an OKD environment, the most suitable candidate for blue-green deployments are the node hosts. All user processes run on these systems and even critical pieces of OKD infrastructure are self-hosted on these resources. Uptime is most important for these workloads and the additional complexity of blue-green deployments can be justified.

The exact implementation of this approach varies based on your requirements. Often the main challenge is having the excess capacity to facilitate such an approach.

Blue-Green Deployment Upgrade

Figure 1. Blue-Green Deployment

Preparing for a Blue-Green Upgrade

After you have upgraded your master and etcd hosts using method described for In-place Upgrades, use the following sections to prepare your environment for a blue-green upgrade of the remaining node hosts.

Labeling Blue Nodes

You must ensure that your current node hosts in production are labeled either blue or green. In this example, the current production environment is blue, and the new environment is green.

  1. Get the current list of node names known to the cluster:

    1. $ oc get nodes
  2. Label all non-master node hosts (compute nodes) and dedicated infrastructure nodes in your current production environment with color=blue:

    1. $ oc label node --selector=node-role.kubernetes.io/compute=true color=blue
    2. $ oc label node --selector=node-role.kubernetes.io/infra=true color=blue

    In the previous command, the --selector flag is used to match a subset of the cluster using the relevant node labels, and all matches are labeled with color=blue.

Creating and Labeling Green Nodes

Create the green environment by adding an equal number of new node hosts to the existing cluster:

  1. Add the new node hosts using the procedure as described in Adding Hosts to an Existing Cluster. When updating your inventory file with the [new_nodes] group in that procedure, ensure these variables are set:

    • In order to delay workload scheduling until the nodes are deemed healthy, which you verify in later steps, set the openshift_schedulable=false variable for each new node host to ensure they are unschedulable initially.

    • Because the new hosts run OKD version 3.10, they must now use the openshift_node_group_name variable to set a node group per host entry. See Defining Node Groups and Host Mappings for details.

    The new node host group resembles the following example:

    Example [new_nodes] Host Group

    1. [new_nodes]
    2. node4.example.com openshift_node_group_name='node-config-compute' openshift_schedulable=false
    3. node5.example.com openshift_node_group_name='node-config-compute' openshift_schedulable=false
    4. node6.example.com openshift_node_group_name='node-config-compute' openshift_schedulable=false
    5. infra-node3.example.com openshift_node_group_name='node-config-infra' openshift_schedulable=false
    6. infra-node4.example.com openshift_node_group_name='node-config-infra' openshift_schedulable=false

    Do not remove or modify your existing node groups.

  2. After the new nodes deploy, apply the color=green label to each new node:

    1. $ oc label node <node_name> color=green

Verifying Green Nodes

Verify that your new green nodes are in a healthy state:

  1. Verify that new nodes are detected in the cluster and are in Ready,SchedulingDisabled state:

    1. $ oc get nodes
    2. NAME STATUS ROLES AGE
    3. node4.example.com Ready,SchedulingDisabled compute 1d
  2. Verify that the green nodes have proper labels:

    1. $ oc get nodes --show-labels
    2. NAME STATUS ROLES AGE LABELS
    3. node4.example.com Ready,SchedulingDisabled compute 1d beta.kubernetes.io/arch=amd64,beta.kubernetes.io/os=linux,color=green,kubernetes.io/hostname=m01.example.com,node-role.kubernetes.io/compute=true
  3. Perform a diagnostic check for the cluster:

    1. $ oc adm diagnostics
    2. [Note] Determining if client configuration exists for client/cluster diagnostics
    3. Info: Successfully read a client config file at '/root/.kube/config'
    4. Info: Using context for cluster-admin access: 'default/m01-example-com:8443/system:admin'
    5. [Note] Performing systemd discovery
    6. [Note] Running diagnostic: ConfigContexts[default/m01-example-com:8443/system:admin]
    7. Description: Validate client config context is complete and has connectivity
    8. ...
    9. [Note] Running diagnostic: CheckExternalNetwork
    10. Description: Check that external network is accessible within a pod
    11. [Note] Running diagnostic: CheckNodeNetwork
    12. Description: Check that pods in the cluster can access its own node.
    13. [Note] Running diagnostic: CheckPodNetwork
    14. Description: Check pod to pod communication in the cluster. In case of ovs-subnet network plugin, all pods
    15. should be able to communicate with each other and in case of multitenant network plugin, pods in non-global projects
    16. should be isolated and pods in global projects should be able to access any pod in the cluster and vice versa.
    17. [Note] Running diagnostic: CheckServiceNetwork
    18. Description: Check pod to service communication in the cluster. In case of ovs-subnet network plugin, all
    19. pods should be able to communicate with all services and in case of multitenant network plugin, services in non-global
    20. projects should be isolated and pods in global projects should be able to access any service in the cluster.
    21. ...

Preparing the Green Nodes

To migrate pods from the blue environment to the green, you must pull the required container images.

Network latency and load on the registry can cause delays if the environment does not have sufficient capacity. You can minimize impact to the running system by importing new image streams to trigger new pod deployments to the new nodes.

Major releases of OKD, and sometimes asynchronous errata updates, introduce new image streams for builder images for users of Source-to-Image (S2I). Upon import, any builds or deployments configured with image change triggers are automatically created.

Another benefit of triggering the builds is that it fetches the majority of the ancillary images to all node hosts, such as the various builder images, the pod infrastructure image, and deployers. The green nodes are then prepared for the expected load increase, and the remaining images more quickly migrated during node evacuation.

When you are ready to continue with the upgrade process, follow these steps to warm the green nodes:

  1. Set the green nodes to schedulable so that new pods are deployed to them:

    1. $ oc adm manage-node --schedulable=true --selector=color=green
  2. Set the blue nodes to unschedulable so that no new pods run on them:

    1. $ oc adm manage-node --schedulable=false --selector=color=blue
  3. Update the node selectors for the registry and router deployment configurations to use the node-role.kubernetes.io/infra=true label. This change starts new deployments that place the registry and router pods on your new infrastructure nodes.

    1. Edit the docker-registry deployment configuration:

      1. $ oc edit -n default dc/docker-registry
    2. Update the nodeSelector parameter to use the following value, with "true" in quotation marks, and save your changes:

      1. nodeSelector:
      2. node-role.kubernetes.io/infra: "true"
    3. Edit the router deployment configuration:

      1. $ oc edit -n default dc/router
    4. Update the nodeSelector parameter to use the following value, with "true" in quotation marks, and save your changes:

      1. nodeSelector:
      2. node-role.kubernetes.io/infra: "true"
    5. Verify that the docker-registry and router pods are running and in ready state on the new infrastructure nodes:

      1. $ oc get pods -n default -o wide
      2. NAME READY STATUS RESTARTS AGE IP NODE
      3. docker-registry-2-b7xbn 1/1 Running 0 18m 10.128.0.188 infra-node3.example.com
      4. router-2-mvq6p 1/1 Running 0 6m 192.168.122.184 infra-node4.example.com
  4. Update the default image streams and templates.

  5. Import the latest images. This process can trigger a large number of builds, but the builds are performed on the green nodes and, therefore, do not impact any traffic on the blue deployment.

  6. To monitor build progress across all namespaces (projects) in the cluster:

    1. $ oc get events -w --all-namespaces

    In large environments, builds rarely completely stop. However, you should see a large increase and decrease caused by the administrative image import.

Evacuating and Decommissioning Blue Nodes

For larger deployments, it is possible to have other labels that help determine how evacuation can be coordinated. The most conservative approach for avoiding downtime is to evacuate one node host at a time.

If services are composed of pods using zone anti-affinity, you can evacuate an entire zone at one time. You must ensure that the storage volumes used are available in the new zone. Follow the directions in your cloud provider’s documentation.

In OKD 1.2 and later, a node host evacuation is triggered whenever the node service is stopped. Node labeling is very important and can cause issues if nodes are mislabled or commands are run on nodes with generalized labels. Exercise caution if master hosts are also labeled with color=blue.

When you are ready to continue with the upgrade process, follow these steps.

  1. Evacuate and delete all blue nodes with the following commands:

    1. $ oc adm manage-node --selector=color=blue --evacuate
    2. $ oc delete node --selector=color=blue
  2. After the blue node hosts no longer contain pods and have been removed from OKD, they are safe to power off. As a safety precaution, confirm that there are no issues with the upgrade before you power off the hosts.

    1. Back up any useful scripts or required files that are stored on the hosts.

    2. After you are comfortable that the upgrade succeeded, remove these hosts.