-
Notifications
You must be signed in to change notification settings - Fork 1
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Found new managed modules references (#246)
New managed modules references found. Please review. Co-authored-by: unmultimedio <[email protected]>
- Loading branch information
1 parent
e241f90
commit 3c50b0c
Showing
10 changed files
with
1,476 additions
and
4 deletions.
There are no files selected for viewing
170 changes: 170 additions & 0 deletions
170
...cb13ff6cd094798b50e700ccd0fb9d0eb05baafa62beabea0cc3a291d2dceada84d557b0eb1c7086077748acf
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,170 @@ | ||
syntax = "proto3"; | ||
|
||
package envoy.config.cluster.v3; | ||
|
||
import "google/protobuf/duration.proto"; | ||
import "google/protobuf/wrappers.proto"; | ||
|
||
import "udpa/annotations/status.proto"; | ||
import "udpa/annotations/versioning.proto"; | ||
import "validate/validate.proto"; | ||
|
||
option java_package = "io.envoyproxy.envoy.config.cluster.v3"; | ||
option java_outer_classname = "OutlierDetectionProto"; | ||
option java_multiple_files = true; | ||
option go_package = "github.com/envoyproxy/go-control-plane/envoy/config/cluster/v3;clusterv3"; | ||
option (udpa.annotations.file_status).package_version_status = ACTIVE; | ||
|
||
// [#protodoc-title: Outlier detection] | ||
|
||
// See the :ref:`architecture overview <arch_overview_outlier_detection>` for | ||
// more information on outlier detection. | ||
// [#next-free-field: 24] | ||
message OutlierDetection { | ||
option (udpa.annotations.versioning).previous_message_type = | ||
"envoy.api.v2.cluster.OutlierDetection"; | ||
|
||
// The number of consecutive server-side error responses (for HTTP traffic, | ||
// 5xx responses; for TCP traffic, connection failures; for Redis, failure to | ||
// respond PONG; etc.) before a consecutive 5xx ejection occurs. Defaults to 5. | ||
google.protobuf.UInt32Value consecutive_5xx = 1; | ||
|
||
// The time interval between ejection analysis sweeps. This can result in | ||
// both new ejections as well as hosts being returned to service. Defaults | ||
// to 10000ms or 10s. | ||
google.protobuf.Duration interval = 2 [(validate.rules).duration = {gt {}}]; | ||
|
||
// The base time that a host is ejected for. The real time is equal to the | ||
// base time multiplied by the number of times the host has been ejected and is | ||
// capped by :ref:`max_ejection_time<envoy_v3_api_field_config.cluster.v3.OutlierDetection.max_ejection_time>`. | ||
// Defaults to 30000ms or 30s. | ||
google.protobuf.Duration base_ejection_time = 3 [(validate.rules).duration = {gt {}}]; | ||
|
||
// The maximum % of an upstream cluster that can be ejected due to outlier | ||
// detection. Defaults to 10% but will eject at least one host regardless of the value. | ||
google.protobuf.UInt32Value max_ejection_percent = 4 [(validate.rules).uint32 = {lte: 100}]; | ||
|
||
// The % chance that a host will be actually ejected when an outlier status | ||
// is detected through consecutive 5xx. This setting can be used to disable | ||
// ejection or to ramp it up slowly. Defaults to 100. | ||
google.protobuf.UInt32Value enforcing_consecutive_5xx = 5 [(validate.rules).uint32 = {lte: 100}]; | ||
|
||
// The % chance that a host will be actually ejected when an outlier status | ||
// is detected through success rate statistics. This setting can be used to | ||
// disable ejection or to ramp it up slowly. Defaults to 100. | ||
google.protobuf.UInt32Value enforcing_success_rate = 6 [(validate.rules).uint32 = {lte: 100}]; | ||
|
||
// The number of hosts in a cluster that must have enough request volume to | ||
// detect success rate outliers. If the number of hosts is less than this | ||
// setting, outlier detection via success rate statistics is not performed | ||
// for any host in the cluster. Defaults to 5. | ||
google.protobuf.UInt32Value success_rate_minimum_hosts = 7; | ||
|
||
// The minimum number of total requests that must be collected in one | ||
// interval (as defined by the interval duration above) to include this host | ||
// in success rate based outlier detection. If the volume is lower than this | ||
// setting, outlier detection via success rate statistics is not performed | ||
// for that host. Defaults to 100. | ||
google.protobuf.UInt32Value success_rate_request_volume = 8; | ||
|
||
// This factor is used to determine the ejection threshold for success rate | ||
// outlier ejection. The ejection threshold is the difference between the | ||
// mean success rate, and the product of this factor and the standard | ||
// deviation of the mean success rate: mean - (stdev * | ||
// success_rate_stdev_factor). This factor is divided by a thousand to get a | ||
// double. That is, if the desired factor is 1.9, the runtime value should | ||
// be 1900. Defaults to 1900. | ||
google.protobuf.UInt32Value success_rate_stdev_factor = 9; | ||
|
||
// The number of consecutive gateway failures (502, 503, 504 status codes) | ||
// before a consecutive gateway failure ejection occurs. Defaults to 5. | ||
google.protobuf.UInt32Value consecutive_gateway_failure = 10; | ||
|
||
// The % chance that a host will be actually ejected when an outlier status | ||
// is detected through consecutive gateway failures. This setting can be | ||
// used to disable ejection or to ramp it up slowly. Defaults to 0. | ||
google.protobuf.UInt32Value enforcing_consecutive_gateway_failure = 11 | ||
[(validate.rules).uint32 = {lte: 100}]; | ||
|
||
// Determines whether to distinguish local origin failures from external errors. If set to true | ||
// the following configuration parameters are taken into account: | ||
// :ref:`consecutive_local_origin_failure<envoy_v3_api_field_config.cluster.v3.OutlierDetection.consecutive_local_origin_failure>`, | ||
// :ref:`enforcing_consecutive_local_origin_failure<envoy_v3_api_field_config.cluster.v3.OutlierDetection.enforcing_consecutive_local_origin_failure>` | ||
// and | ||
// :ref:`enforcing_local_origin_success_rate<envoy_v3_api_field_config.cluster.v3.OutlierDetection.enforcing_local_origin_success_rate>`. | ||
// Defaults to false. | ||
bool split_external_local_origin_errors = 12; | ||
|
||
// The number of consecutive locally originated failures before ejection | ||
// occurs. Defaults to 5. Parameter takes effect only when | ||
// :ref:`split_external_local_origin_errors<envoy_v3_api_field_config.cluster.v3.OutlierDetection.split_external_local_origin_errors>` | ||
// is set to true. | ||
google.protobuf.UInt32Value consecutive_local_origin_failure = 13; | ||
|
||
// The % chance that a host will be actually ejected when an outlier status | ||
// is detected through consecutive locally originated failures. This setting can be | ||
// used to disable ejection or to ramp it up slowly. Defaults to 100. | ||
// Parameter takes effect only when | ||
// :ref:`split_external_local_origin_errors<envoy_v3_api_field_config.cluster.v3.OutlierDetection.split_external_local_origin_errors>` | ||
// is set to true. | ||
google.protobuf.UInt32Value enforcing_consecutive_local_origin_failure = 14 | ||
[(validate.rules).uint32 = {lte: 100}]; | ||
|
||
// The % chance that a host will be actually ejected when an outlier status | ||
// is detected through success rate statistics for locally originated errors. | ||
// This setting can be used to disable ejection or to ramp it up slowly. Defaults to 100. | ||
// Parameter takes effect only when | ||
// :ref:`split_external_local_origin_errors<envoy_v3_api_field_config.cluster.v3.OutlierDetection.split_external_local_origin_errors>` | ||
// is set to true. | ||
google.protobuf.UInt32Value enforcing_local_origin_success_rate = 15 | ||
[(validate.rules).uint32 = {lte: 100}]; | ||
|
||
// The failure percentage to use when determining failure percentage-based outlier detection. If | ||
// the failure percentage of a given host is greater than or equal to this value, it will be | ||
// ejected. Defaults to 85. | ||
google.protobuf.UInt32Value failure_percentage_threshold = 16 | ||
[(validate.rules).uint32 = {lte: 100}]; | ||
|
||
// The % chance that a host will be actually ejected when an outlier status is detected through | ||
// failure percentage statistics. This setting can be used to disable ejection or to ramp it up | ||
// slowly. Defaults to 0. | ||
// | ||
// [#next-major-version: setting this without setting failure_percentage_threshold should be | ||
// invalid in v4.] | ||
google.protobuf.UInt32Value enforcing_failure_percentage = 17 | ||
[(validate.rules).uint32 = {lte: 100}]; | ||
|
||
// The % chance that a host will be actually ejected when an outlier status is detected through | ||
// local-origin failure percentage statistics. This setting can be used to disable ejection or to | ||
// ramp it up slowly. Defaults to 0. | ||
google.protobuf.UInt32Value enforcing_failure_percentage_local_origin = 18 | ||
[(validate.rules).uint32 = {lte: 100}]; | ||
|
||
// The minimum number of hosts in a cluster in order to perform failure percentage-based ejection. | ||
// If the total number of hosts in the cluster is less than this value, failure percentage-based | ||
// ejection will not be performed. Defaults to 5. | ||
google.protobuf.UInt32Value failure_percentage_minimum_hosts = 19; | ||
|
||
// The minimum number of total requests that must be collected in one interval (as defined by the | ||
// interval duration above) to perform failure percentage-based ejection for this host. If the | ||
// volume is lower than this setting, failure percentage-based ejection will not be performed for | ||
// this host. Defaults to 50. | ||
google.protobuf.UInt32Value failure_percentage_request_volume = 20; | ||
|
||
// The maximum time that a host is ejected for. See :ref:`base_ejection_time<envoy_v3_api_field_config.cluster.v3.OutlierDetection.base_ejection_time>` | ||
// for more information. If not specified, the default value (300000ms or 300s) or | ||
// :ref:`base_ejection_time<envoy_v3_api_field_config.cluster.v3.OutlierDetection.base_ejection_time>` value is applied, whatever is larger. | ||
google.protobuf.Duration max_ejection_time = 21 [(validate.rules).duration = {gt {}}]; | ||
|
||
// The maximum amount of jitter to add to the ejection time, in order to prevent | ||
// a 'thundering herd' effect where all proxies try to reconnect to host at the same time. | ||
// See :ref:`max_ejection_time_jitter<envoy_v3_api_field_config.cluster.v3.OutlierDetection.base_ejection_time>` | ||
// Defaults to 0s. | ||
google.protobuf.Duration max_ejection_time_jitter = 22; | ||
|
||
// If active health checking is enabled and a host is ejected by outlier detection, a successful active health check | ||
// unejects the host by default and considers it as healthy. Unejection also clears all the outlier detection counters. | ||
// To change this default behavior set this config to ``false`` where active health checking will not uneject the host. | ||
// Defaults to true. | ||
google.protobuf.BoolValue successful_active_health_check_uneject_host = 23; | ||
} |
Oops, something went wrong.