Open rafaelgaspar opened 5 years ago
We ran into this a while ago and ended up doing a quick patch to unblock ourselves - https://github.com/roverdotcom/veneur/compare/master...roverdotcom:v13.1.0-rover
When I started to look into doing something that could possibly be merged upstream, I realized there probably needs to be some discussion about the possibility of adding some kind of pluggable discovery pattern and allowing real kubernetes_*
configuration for this particular discovery rather than detecting being in kubernetes and using the consul configuration. I then got busy for a couple years, but just ran across this today :). We'd love to help think about how to get the kubernetes discovery uplifted a bit and merged in if possible so we could get back upstream as well.
Our quick patch just looks for the service name to contain the substring grpc
, and if it does, it looks for a port definition on the pod named exactly grpc
and configures the returned ip list accordingly, without the leading http://
. This has worked for us, but is obviously continuing the quick and dirty way of getting k8s discovery to work.
FYI if you are running veneur-proxy in kubernetes with grpc, you might also run into #788
I've been trying to use
veneur-proxy
on our setup that only has oneveneur-global
and a bunch ofveneur-local
's running as sidecars on each pod that needs to send metrics to Datadog.The setup with just one
veneur-global
works fine, but after fiddling around with the proxy, the farthest I've got was:That error is similar to when the forward GRPC address is added with the
http://
prefix and looking at the code it seams that the"http://"
is hardcoded added by theKubernetesDiscoverer
while it's not added byConsul
.What is the reasoning for that? I don't want to fallback to sending this over HTTP just because the discoverer can't handle this.
Thanks for your time.