Canary Rollout

  1. Please make sure you have read the doc of about the basic deployment of Kubernetes resources.

  2. Make sure you have already enabled the kruise-rollout addon, our canary rollout capability relies on the rollouts from OpenKruise.

    1. vela addon enable kruise-rollout
  3. Please make sure one of the ingress controllers is available in your Kubernetes cluster. You can also enable the ingress-nginx or traefik addon if you don’t have any:

    1. vela addon enable ingress-nginx

    Please refer to the addon doc to get the access address of gateway.

  4. Some of the commands such as rollback relies on vela-cli >=1.5.0-alpha.1, please upgrade the command line for convenience. You don’t need to upgrade the controller.

Kubernetes resources can be anything, this canary rollout works for the scenarios within the following limits:

  1. The Kubernetes resources contain a service pointing to the workload along with an ingress routing to the service.
  2. Workloads supported including Kubernetes Deployment, StatefulSet, and OpenKruise Cloneset. That means the workload specified must be one of these three types.

When you want to use the canary rollout, you need to add the kruise-rollout trait at the first time, this configuration will take effect at next release process. Deploy the application with traits like below:

  1. cat <<EOF | vela up -f -
  2. apiVersion: core.oam.dev/v1beta1
  3. kind: Application
  4. metadata:
  5. name: canary-demo
  6. namespace: default
  7. annotations:
  8. app.oam.dev/publishVersion: v1
  9. spec:
  10. components:
  11. - name: canary-demo
  12. properties:
  13. objects:
  14. - apiVersion: apps/v1
  15. kind: Deployment
  16. metadata:
  17. name: canary-demo
  18. spec:
  19. replicas: 5
  20. selector:
  21. matchLabels:
  22. app: demo
  23. template:
  24. metadata:
  25. labels:
  26. app: demo
  27. spec:
  28. containers:
  29. - image: barnett/canarydemo:v1
  30. name: demo
  31. ports:
  32. - containerPort: 8090
  33. - apiVersion: v1
  34. kind: Service
  35. metadata:
  36. labels:
  37. app: demo
  38. name: canary-demo
  39. namespace: default
  40. spec:
  41. ports:
  42. - name: http
  43. port: 8090
  44. protocol: TCP
  45. targetPort: 8090
  46. selector:
  47. app: demo
  48. - apiVersion: networking.k8s.io/v1
  49. kind: Ingress
  50. metadata:
  51. labels:
  52. app: demo
  53. name: canary-demo
  54. namespace: default
  55. spec:
  56. ingressClassName: nginx
  57. rules:
  58. - host: canary-demo.com
  59. http:
  60. paths:
  61. - backend:
  62. service:
  63. name: canary-demo
  64. port:
  65. number: 8090
  66. path: /version
  67. pathType: ImplementationSpecific
  68. type: k8s-objects
  69. traits:
  70. - type: kruise-rollout
  71. properties:
  72. canary:
  73. steps:
  74. # The first batch of Canary releases 20% Pods, and 20% traffic imported to the new version, require manual confirmation before subsequent releases are completed
  75. - weight: 20
  76. # The second batch of Canary releases 90% Pods, and 90% traffic imported to the new version.
  77. - weight: 90
  78. trafficRoutings:
  79. - type: nginx
  80. EOF

Here’s an overview about what will happen when upgrade under this kruise-rollout trait configuration, the whole process will be divided into 3 steps:

  1. When the upgrade start, a new canary deployment will be created with 20% of the total replicas. In our example, we have 5 total replicas, it will keep all the old ones and create 5 * 20% = 1 for the new canary, and serve for 20% of the traffic. It will wait for a manual approval when everything gets ready.
    • By default, the percent of replicas are aligned with the traffic, you can also configure the replicas individually according to this doc.
  2. After the manual approval, the second batch starts. It will create 5 * 90% = 4.5 which is actually 5 replicas of new version in the system with the 90% traffic. As a result, the system will totally have 10 replicas now. It will wait for a second manual approval.
  3. After the second approval, it will update the workload which means leverage the rolling update mechanism of the workload itself for upgrade. After the workload finished the upgrade, all the traffic will route to that workload and the canary deployment will be destroyed.

Let’s continue our demo, the first deployment has no difference with a normal deploy, you can check the status of application to make sure it’s running for our next step.

  1. vela status canary-demo

If you have enabled velaux addon, you can view the application topology graph that all v1 pods are ready now.

image

Access the gateway endpoint with the specific host.

  1. $ curl -H "Host: canary-demo.com" <ingress-controller-address>/version
  2. Demo: V1

Modify the image tag from v1 to v2 as follows:

  1. cat <<EOF | vela up -f -
  2. apiVersion: core.oam.dev/v1beta1
  3. kind: Application
  4. metadata:
  5. name: canary-demo
  6. namespace: default
  7. annotations:
  8. app.oam.dev/publishVersion: v2
  9. spec:
  10. components:
  11. - name: canary-demo
  12. properties:
  13. objects:
  14. - apiVersion: apps/v1
  15. kind: Deployment
  16. metadata:
  17. name: canary-demo
  18. spec:
  19. replicas: 5
  20. selector:
  21. matchLabels:
  22. app: demo
  23. template:
  24. metadata:
  25. labels:
  26. app: demo
  27. spec:
  28. containers:
  29. - image: barnett/canarydemo:v2
  30. name: demo
  31. ports:
  32. - containerPort: 8090
  33. - apiVersion: v1
  34. kind: Service
  35. metadata:
  36. labels:
  37. app: demo
  38. name: canary-demo
  39. namespace: default
  40. spec:
  41. ports:
  42. - name: http
  43. port: 8090
  44. protocol: TCP
  45. targetPort: 8090
  46. selector:
  47. app: demo
  48. - apiVersion: networking.k8s.io/v1
  49. kind: Ingress
  50. metadata:
  51. labels:
  52. app: demo
  53. name: canary-demo
  54. namespace: default
  55. spec:
  56. ingressClassName: nginx
  57. rules:
  58. - host: canary-demo.com
  59. http:
  60. paths:
  61. - backend:
  62. service:
  63. name: canary-demo
  64. port:
  65. number: 8090
  66. path: /version
  67. pathType: ImplementationSpecific
  68. type: k8s-objects
  69. traits:
  70. - type: kruise-rollout
  71. properties:
  72. canary:
  73. steps:
  74. # The first batch of Canary releases 20% Pods, and 20% traffic imported to the new version, require manual confirmation before subsequent releases are completed
  75. - weight: 20
  76. # The second batch of Canary releases 90% Pods, and 90% traffic imported to the new version.
  77. - weight: 90
  78. trafficRoutings:
  79. - type: nginx
  80. EOF

It will create a canary deployment and wait for manual approval, check the status of the application:

  1. $ vela status canary-demo
  2. About:
  3. Name: canary-demo
  4. Namespace: default
  5. Created at: 2022-06-09 16:43:10 +0800 CST
  6. Status: runningWorkflow
  7. Workflow:
  8. mode: DAG
  9. finished: false
  10. Suspend: false
  11. Terminated: false
  12. Steps
  13. - id:8adxa11wku
  14. name:canary-demo
  15. type:apply-component
  16. phase:running
  17. message:wait healthy
  18. Services:
  19. - Name: canary-demo
  20. Cluster: local Namespace: default
  21. Type: webservice
  22. Unhealthy Ready:5/5
  23. Traits:
  24. scaler gateway: No loadBalancer found, visiting by using 'vela port-forward canary-demo'
  25. kruise-rollout: Rollout is in step(1/1), and you need manually confirm to enter the next step

The application’s status is runningWorkflow that means the application’s rollout process has not finished yet.

View topology graph again, you will see kruise-rollout trait created a v2 pod, and this pod will serve the canary traffic. Meanwhile, the pods of v1 are still running and server non-canary traffic.

image

Access the gateway endpoint again. You will find out there is about 20% chance to meet Demo: v2 result.

  1. $ curl -H "Host: canary-demo.com" <ingress-controller-address>/version
  2. Demo: V2

After verify the success of the canary version through business-related metrics, such as logs, metrics, and other means, you can resume the workflow to continue the process of rollout.

  1. vela workflow resume canary-demo

Access the gateway endpoint again multi times. You will find out the chance to meet result Demo: v2 is highly increased, almost 90%.

  1. $ curl -H "Host: canary-demo.com" <ingress-controller-address>/version
  2. Demo: V2

In the end, you can resume again to finish the rollout process.

  1. vela workflow resume canary-demo

Access the gateway endpoint again multi times. You will find out the result always is Demo: v2.

  1. $ curl -H "Host: canary-demo.com" <ingress-controller-address>/version
  2. Demo: V2

If you want to cancel the rollout process and rollback the application to the latest version, after manually check. You can rollback the rollout workflow:

You should suspend the workflow before rollback:

  1. $ vela workflow suspend canary-demo
  2. Rollout default/canary-demo in cluster suspended.
  3. Successfully suspend workflow: canary-demo

Then rollback:

  1. $ vela workflow rollback canary-demo
  2. Application spec rollback successfully.
  3. Application status rollback successfully.
  4. Rollout default/canary-demo in cluster rollback.
  5. Successfully rollback rolloutApplication outdated revision cleaned up.

Access the gateway endpoint again. You can see the result always is Demo: V1.

  1. $ curl -H "Host: canary-demo.com" <ingress-controller-address>/version
  2. Demo: V1

Any rollback operation in middle of a runningWorkflow will rollback to the latest succeeded revision of this application. So, if you deploy a successful v1 and upgrade to v2, but this version didn’t succeed while you continue to upgrade to v3. The rollback of v3 will automatically to v1, because release v2 is not a succeeded one.

Last updated on 2023年2月9日 by dependabot[bot]