CiliumEndpointSlice (beta)
Note
This is a beta feature. Please provide feedback and file a GitHub issue if you experience any problems.
This document describes CiliumEndpointSlice (CES), which enables batching of CiliumEndpoint (CEP) objects in the cluster to achieve better scalability. The concept of CiliumEndpointSlice is described in:
When enabled, Cilium operator watches CEP objects and group/batch slim versions of them into CES objects. Cilium agent watches CES objects to learn about remote endpoints in this mode. API-server stress due to remote endpoint info propagation should be reduced in this case, allowing for better scalability, at the cost of potentially longer delay before identity of new endpoint is recognized throughout the cluster.
Deploy Cilium with CES
The CES feature relies on use of CEP. This feature is disabled by default in current beta status. You can enable the feature by setting the enableCiliumEndpointSlice
value to true
.
helm install cilium cilium/cilium --version 1.12.0 \
--set enableCiliumEndpointSlice=true
Verify that Cilium agent and operator pods are running.
$ kubectl get pods -n kube-system -l k8s-app=cilium
NAMESPACE NAME READY STATUS RESTARTS AGE
kube-system cilium-7tnkq 1/1 Running 0 1d
$ kubectl get pods -n kube-system -l io.cilium/app=operator
NAMESPACE NAME READY STATUS RESTARTS AGE
kube-system cilium-operator-855979b54b-w8rsm 1/1 Running 0 1d
Validate that the CiliumEndpointSlice CRD has been registered.
$ kubectl get crds --all-namespaces
NAME CREATED AT
[...]
ciliumendpointslices.cilium.io 2021-11-05T05:41:28Z
Known Issues and Workarounds
Potential Upgrade Impact
When performing an upgrade from a non-CES mode to CES mode, the operator will need to process all existing CEPs in the cluster and create CESs for them. Depending on the load of the cluster, this could take some time.
During this period, new endpoints might experience longer delay before their identities will propagate to remote nodes. If a newly created pod is affected by this delay, then it may temporarily fail to establish connectivity to remote pods in the cluster.
A mitigation strategy is to upgrade the operator from non-CES to CES before upgrading agents on each node. This will let it start creating CESs right away, while the agents are still watching CEP resources.
Potential Racing Condition when Identity of An Existing Endpoint Changes
When there’s an identity change for any existing resources, e.g., a pod, a deployment or a statefulset, although unlikely, the endpoints that undergo this change might experience connection disruption.
Root cause for this potential disruption is that when identity of CEPs change, the operator will try to re-group/re-batch them into a different set of CESs. This breaks the atomic operation of an UPGRADE into that of an DELETE and an ADD. If the agent gets the DELETE (from old CES) first, it will remove the corresponding CEP’s information from the ipcache, resulting in traffic to/from said CEP with an UNKNOWN identity.
In current implementation, Cilium adds a delay (default: 1s) before sending out the DELETE event. This should greatly reduce the probability of connection disruption in most cases.