这是indexloc提供的服务,不要输入任何密码
Skip to content

Conversation

@sourcegraph-release-bot
Copy link
Collaborator

@sourcegraph-release-bot sourcegraph-release-bot commented Nov 14, 2025

Checklist

This change should be invisible, except for customers using the Envoy patch for gitserver, so it's worth mentioning in release notes, where do you recommend I mention this?

Test plan

Developed and tested with a customer, on their self-hosted instance with Istio

Tested on a k3s instance:

  • Deployed the 6.9.0 release
  • Upgraded the Helm install with this branch marc-test-fix-gitserver-ports-for-istio, which is the same code changes, but on top of the v6.9.0 release commit instead of main, to test for any issues for existing customers as they upgrade
  • Configured a code host
  • Cloned some repos
  • Ran some searches
  • Checked pod logs
  • No errors / issues

Tested on an AWS EKS instance
Backport 0074a7e from #756

Changelog

  • Update port names to re-enable service mesh auto config, after migration to gRPC
  • Self-hosted customers using our Helm chart and a Kubernetes service mesh (ex. Istio / Envoy) who had to add an Istio EnvoyFilter to enable trailers on gitserver may need to remove it, if gitserver can no longer communicate with other pods after upgrading

- Istio uses the first part of a port name, and service definitions, to configure its service mesh sidecar proxy containers, based on the expected traffic type; docs: https://istio.io/latest/docs/ops/configuration/traffic-management/protocol-selection/#explicit-protocol-selection
- The `http-` prefix in the port name wasn't updated when we switched to gRPC, so Istio was auto-configuring for http, and failing to send the gRPC traffic
- Making these updates automagically fixes Istio issues, no longer requiring the Envoy patch in [charts/sourcegraph/examples/envoy](https://github.com/sourcegraph/deploy-sourcegraph-helm/tree/main/charts/sourcegraph/examples/envoy)
- Helpful background on Istio here: https://istio.io/latest/docs/ops/deployment/architecture/

### Checklist
- [x] Follow the [manual testing process](https://github.com/sourcegraph/deploy-sourcegraph-helm/blob/main/TEST.md)
- [ ] Update [changelog](https://github.com/sourcegraph/deploy-sourcegraph-helm/blob/main/charts/sourcegraph/CHANGELOG.md)
- [ ] Update [Kubernetes update doc](https://docs.sourcegraph.com/admin/updates/kubernetes)

This change should be invisible, except potentially for customers using the Envoy patch for gitserver

### Test plan

Developed and tested with a customer, on their self-hosted instance with Istio

Tested on a k3s instance:
- Deployed the 6.9.0 release
- Upgraded the Helm install with this branch [marc-test-fix-gitserver-ports-for-istio](https://github.com/sourcegraph/deploy-sourcegraph-helm/tree/marc-test-fix-gitserver-ports-for-istio), which is the same code changes, but on top of the v6.9.0 release commit instead of main, to test for any issues for existing customers as they upgrade
- Configured a code host
- Cloned some repos
- Ran some searches
- Checked pod logs
- No errors / issues

Also tested on an AWS EKS instance

(cherry picked from commit 0074a7e)
@marcleblanc2 marcleblanc2 changed the title [Backport 6.10.x] Fix service mesh auto config after migration to gRPC [Backport 6.10.x] Fix/Helm: Update port names to re-enable service mesh auto config after migration to gRPC Nov 14, 2025
@marcleblanc2 marcleblanc2 changed the title [Backport 6.10.x] Fix/Helm: Update port names to re-enable service mesh auto config after migration to gRPC [Backport 6.10.x] Fix/Helm: Port names in Helm chart Nov 14, 2025
@marcleblanc2
Copy link
Contributor

Note to self: Update the admin update docs page with the correct patch number once this gets released
https://sourcegraph.com/docs/admin/updates/kubernetes#v6100

@DaedalusG DaedalusG merged commit 038b053 into 6.10.x Nov 14, 2025
18 checks passed
@DaedalusG DaedalusG deleted the backport-756-to-6.10.x branch November 14, 2025 21:29
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants