Request Timeouts

This task shows you how to setup request timeouts in Envoy using Istio.

Before you begin

Zip

  1. $ kubectl apply -f @samples/bookinfo/networking/virtual-service-all-v1.yaml@

Request timeouts

A timeout for http requests can be specified using the timeout field of the route rule.By default, the timeout is disabled, but in this task you override the reviews servicetimeout to 1 second.To see its effect, however, you also introduce an artificial 2 second delay in callsto the ratings service.

  • Route requests to v2 of the reviews service, i.e., a version that calls the ratings service:
  1. $ kubectl apply -f - <<EOF
  2. apiVersion: networking.istio.io/v1alpha3
  3. kind: VirtualService
  4. metadata:
  5. name: reviews
  6. spec:
  7. hosts:
  8. - reviews
  9. http:
  10. - route:
  11. - destination:
  12. host: reviews
  13. subset: v2
  14. EOF
  • Add a 2 second delay to calls to the ratings service:
  1. $ kubectl apply -f - <<EOF
  2. apiVersion: networking.istio.io/v1alpha3
  3. kind: VirtualService
  4. metadata:
  5. name: ratings
  6. spec:
  7. hosts:
  8. - ratings
  9. http:
  10. - fault:
  11. delay:
  12. percent: 100
  13. fixedDelay: 2s
  14. route:
  15. - destination:
  16. host: ratings
  17. subset: v1
  18. EOF

You should see the Bookinfo application working normally (with ratings stars displayed),but there is a 2 second delay whenever you refresh the page.

  • Now add a half second request timeout for calls to the reviews service:
  1. $ kubectl apply -f - <<EOF
  2. apiVersion: networking.istio.io/v1alpha3
  3. kind: VirtualService
  4. metadata:
  5. name: reviews
  6. spec:
  7. hosts:
  8. - reviews
  9. http:
  10. - route:
  11. - destination:
  12. host: reviews
  13. subset: v2
  14. timeout: 0.5s
  15. EOF
  • Refresh the Bookinfo web page.

You should now see that it returns in about 1 second, instead of 2, and the reviews are unavailable.

The reason that the response takes 1 second, even though the timeout is configured at half a second, isbecause there is a hard-coded retry in the productpage service, so it calls the timing out reviews servicetwice before returning.

Understanding what happened

In this task, you used Istio to set the request timeout for calls to the reviewsmicroservice to half a second. By default the request timeout is disabled.Since the reviews service subsequently calls the ratings service when handling requests,you used Istio to inject a 2 second delay in calls to ratings to cause thereviews service to take longer than half a second to complete and consequently you could see the timeout in action.

You observed that instead of displaying reviews, the Bookinfo product page (which calls the reviews service to populate the page) displayedthe message: Sorry, product reviews are currently unavailable for this book.This was the result of it receiving the timeout error from the reviews service.

If you examine the fault injection task, you’ll find out that the productpagemicroservice also has its own application-level timeout (3 seconds) for calls to the reviews microservice.Notice that in this task you used an Istio route rule to set the timeout to half a second.Had you instead set the timeout to something greater than 3 seconds (such as 4 seconds) the timeoutwould have had no effect since the more restrictive of the two takes precedence.More details can be found here.

One more thing to note about timeouts in Istio is that in addition to overriding them in route rules,as you did in this task, they can also be overridden on a per-request basis if the application addsan x-envoy-upstream-rq-timeout-ms header on outbound requests. In the header,the timeout is specified in milliseconds instead of seconds.

Cleanup

  • Remove the application routing rules:

Zip

  1. $ kubectl delete -f @samples/bookinfo/networking/virtual-service-all-v1.yaml@
  • If you are not planning to explore any follow-on tasks, see theBookinfo cleanup instructionsto shutdown the application.

See also

Istio as a Proxy for External Services

Configure Istio ingress gateway to act as a proxy for external services.

Multi-Mesh Deployments for Isolation and Boundary Protection

Deploy environments that require isolation into separate meshes and enable inter-mesh communication by mesh federation.

Secure Control of Egress Traffic in Istio, part 3

Comparison of alternative solutions to control egress traffic including performance considerations.

Secure Control of Egress Traffic in Istio, part 2

Use Istio Egress Traffic Control to prevent attacks involving egress traffic.

Secure Control of Egress Traffic in Istio, part 1

Attacks involving egress traffic and requirements for egress traffic control.

Version Routing in a Multicluster Service Mesh

Configuring Istio route rules in a multicluster service mesh.