-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Queue Proxy health checks incompatible with non-HTTP/2 applications #15432
Comments
I'm confused what's making HTTP2 requests? Knative healthchecks are HTTP/1 |
@dprotaso I can see requests being made from the queue-proxy to the user-container and attempting to upgrade to HTTP/2 during the And the code I linked above I believe is the logic for the queue-proxy to perform the HTTP/2 upgrade for these probes. This happens when the feature gate for auto-detecting HTTP2 is set to true |
oh interesting - i didn't realize this was added. h2c upgrade is deprecated https://datatracker.ietf.org/doc/html/rfc9113#section-3.1 We should probably just always be doing HTTP/1 unless the user has specified h2c OR we change the detection to use h2c prior knowledge |
You don't have an example app where this breaks? |
I agree that probes should have always been HTTP/1 to match what would be expected from Kubernetes. But if you want this to remain so you can tell if an app supports HTTP/2 or not, then I would suggest at least gracefully failing if the HTTP/2 check fails (fallback to HTTP/1). Unfortunately I don't have a sample that I could share, but I think it should be reproducible if you just had an app that throws a 500 whenever an |
Hi @braunsonm, thanks for reporting this.
Would it work if you turn this off for now or is this something that fails in other scenarios? |
It does work if it is set to false, but that does mean other applications deployed on Knative can no longer benefit from HTTP/2 which is unfortunate. |
That autodetect feature was never completed. So if the app is using http2 you mean that QP is not going to use it with autodetect= off? What do you mean apps on Knative cant benefit from HTTP/2, could you elaborate? |
I was under the impression that autodetecting HTTP2 feature was required for HTTP2 to be used between the activator and ksvc's. Is that not true? |
This is has to do with probes here. We do support http2 without setting that auto-detect property which btw is not done as a feature (check our grpc tests for example). Also see here on what happens when you turn that on: https://github.com/knative/serving/blob/main/pkg/queue/readiness/probe.go#L233-L242. |
Right now to support HTTP2 requires people to set the apiVersion: serving.knative.dev/v1
kind: Service
metadata:
name: grpc-ping
namespace: default
spec:
template:
spec:
containers:
- image: docker.io/{username}/grpc-ping-go
ports:
- name: h2c
containerPort: 8080 The feature has an issue here #4283 - the idea is to detect the protocol without the labelling |
I see. We use |
@braunsonm is this something functions could help with instead? Do you mind opening an issue there too? |
No it is not. @skonto this is broken in functions because of the flawed implementation in serving. |
/area networking
What version of Knative?
1.15.0
Expected Behavior
Legacy applications may have undefined behavior when HTTP/2 upgrade requests are made. Knative should gracefully handle those errors and downgrade the health check attempt to HTTP/1 or HTTP/1.1.
Actual Behavior
Applications which do not support HTTP/2 will not handle the upgrade request properly. In our case, a legacy application returns a 500 when
OPTIONS
are sent to upgrade the connection. Knative fails the entire healthcheck because of this, even if the same check over HTTP/1 or HTTP/1.1 will properly return a 200.Steps to Reproduce the Problem
Additional Context
It is not within the Kubernetes spec that an application must support HTTP/2 or that it should expect an
OPTIONS
call to its health/liveness probes. OnlyGET
is part of the contract, which the Queue Proxy does not follow.I believe the logic is flawed in the queue proxy's HTTP probes here.
serving/pkg/queue/health/probe.go
Line 155 in 873602a
When an error occurs during the upgrade, maxProto should be set to 1 and Knative should stop trying to make HTTP/2 requests. Currently because of this line, HTTP/2 will be retried indefinitely and HTTP/1 will never be attempted.
The text was updated successfully, but these errors were encountered: