Kubernetes: Deployment Strategies types, and Argo Rollouts

One of the goals of the ArgoCD implementation in our project is to use new Deployment Strategies for our applications.
In this post, we will observe deployment types in Kubernetes, how Deployment is working in Kubernetes and a quick example of the Argo Rollouts.
Deployment Strategies and Kubernetes
Let’s take a short overview of the deployment strategies which are used in Kubernetes.
Out of the box, Kubernetes has two main types of the .spec.strategy.type - the Recreate and RollingUpdate, which is the default one.
Also, you can realize a kind of Canary and Blue-Green deployments, although with some limitations.
Documentation is here>>>.
Recreate
The most simple and straightforward type: during such a deployment, Kubernetes will stop all existing pods and then will spin up a new set.
Obviously, you’ll have some downtime during this, as first old pods need to be stopped (see the Pod Lifecycle — Termination of Pods post for details), and only then new will be created, and then they needs to pass Readiness checks, and during this process, your application will be unavailable for users.
Makes sense to b used if your application can not work with different versions at the same time, for example due to limitations of its databases.
An example of such a deployment:
apiVersion: apps/v1
kind: Deployment
metadata:
  name: hello-deploy
spec:
  replicas: 2
  selector:
    matchLabels:
      app: hello-pod
      version: "1.0"
  strategy:
    type: Recreate
  template:
    metadata:
      labels:
        app: hello-pod
    spec:
      containers:
      - name: hello-pod
        image: nginxdemos/hello
        ports:
        - containerPort: 80
Deploy its version: "1.0":
$ kubectl apply -f deployment.yaml
deployment.apps/hello-deploy created
Check pods:
$ kubectl get pod -l app=hello-pod
NAME READY STATUS RESTARTS AGE
hello-deploy-77bcf495b7-b2s2x 1/1 Running 0 9s
hello-deploy-77bcf495b7-rb8cb 1/1 Running 0 9s
Update its label to the version: "2.0", redeploy and check again:
$ kubectl get pod -l app=hello-pod
NAME READY STATUS RESTARTS AGE
hello-deploy-dd584d88d-vv5bb 0/1 Terminating 0 51s
hello-deploy-dd584d88d-ws2xp 0/1 Terminating 0 51s
Both pods were killed, only after this, new pods will be created:
$ kubectl get pod -l app=hello-pod
NAME READY STATUS RESTARTS AGE
hello-deploy-d6c989569-c67vt 1/1 Running 0 27s
hello-deploy-d6c989569-n7ktz 1/1 Running 0 27s
Rolling Update
The RollingUpdate is a bit more interesting: here, Kubernetes will run new pods in parallel with the old, then will kill the old version and will leave new. Thus, during deploy some time will work both old and new versions of an application. Is the default type of Deployments.
With this approach, we have zero downtime as during an update we have both versions running.
Still, there are situations when this approach can not be applied, for example, if during start, pods will run MySQL migrations that will update a database schema in such a way, that the old application’s version can’t use.
An example of such deployment:
apiVersion: apps/v1
kind: Deployment
metadata:
  name: hello-deploy
spec:
  replicas: 2
  selector:
    matchLabels:
      app: hello-pod
  strategy:
    type: RollingUpdate
    rollingUpdate:
      maxUnavailable: 0
      maxSurge: 1
  template:
    metadata:
      labels:
        app: hello-pod
        version: "1.0"
    spec:
      containers:
      - name: hello-pod
        image: nginxdemos/hello
        ports:
        - containerPort: 80
Here, we’ve changed the strategy.type: Recreate to the type: RollingUpdate, and added two optional fields that will define a Deployment behavior during an update:
  • maxUnavailable: how many pods from the replicas can be killed to run new ones. Can be set as a number or percent.
  • maxSurge: how many pods can be created over the value from the replicas. Can be set as a number or percent.
  • In the sample above, we’ve set zero in the maxUnavailable, i.e. we don't want to stop any existing pods until new will be started, and maxSurge is set to 1, so during an update, Kubernetes will create one additional pod, and when it will be in the Running state, Kubernetes will drop one old pod.
    Deploy with the 1.0 version:
    $ kubectl apply -f deployment.yaml
    deployment.apps/hello-deploy created
    Got two pods running:
    $ kubectl get pod -l app=hello-pod
    NAME READY STATUS RESTARTS AGE
    hello-deploy-dd584d88d-84qk4 0/1 ContainerCreating 0 3s
    hello-deploy-dd584d88d-cgc5v 1/1 Running 0 3s
    Update the version to 2.0, deploy it again, and check pods:
    $ kubectl get pod -l app=hello-pod
    NAME READY STATUS RESTARTS AGE
    hello-deploy-d6c989569-dkz7d 0/1 ContainerCreating 0 3s
    hello-deploy-dd584d88d-84qk4 1/1 Running 0 55s
    hello-deploy-dd584d88d-cgc5v 1/1 Running 0 55s
    We got one additional pod beyond the value of the replicas.
    Kubernetes Canary Deployment
    The Canary type implies creating new pods in parallel with old ones, in the same way as the Rolling Update does, but gives a bit more control over the update process.
    After running a new version of an application, some part of new requests will be routed to it, and some part will proceed using the old version.
    If the new version is working well, then the rest of the users will be switched to the new one and old pods will be deleted.
    The Canary type isn’t included to the .spec.strategy.type, but it can be realized without new controllers by Kubernetes itself.
    In doing so, the solution will be rudimentary and complicated in management.
    Still, we can do it by creating two Deployments with different versions on an application, but both will be using a Service with the same set of labels in its selector.
    So, let’s create such a Deployments and a Service with the LoadBalancer type.
    In the Deployment-1 set replicas: 2, and for the Deployment-2 - 0:
    apiVersion: apps/v1
    kind: Deployment
    metadata:
      name: hello-deploy-1
    spec:
      replicas: 2
      selector:
        matchLabels:
          app: hello-pod
      template:
        metadata:
          labels:
            app: hello-pod
            version: "1.0"
        spec:
          containers:
          - name: hello-pod
            image: nginxdemos/hello
            ports:
            - containerPort: 80
            lifecycle:
              postStart:
                exec:
                  command: ["/bin/sh", "-c", "echo 1 > /usr/share/nginx/html/index.html"]
    --------
    apiVersion: apps/v1
    kind: Deployment
    metadata:
      name: hello-deploy-2
    spec:
      replicas: 0
      selector:
        matchLabels:
          app: hello-pod
      template:
        metadata:
          labels:
            app: hello-pod
            version: "2.0"
        spec:
          containers:
          - name: hello-pod
            image: nginxdemos/hello
            ports:
            - containerPort: 80
            lifecycle:
              postStart:
                exec:
                  command: ["/bin/sh", "-c", "echo 2 > /usr/share/nginx/html/index.html"]
    --------
    apiVersion: v1
    kind: Service 
    metadata:
      name: hello-svc
    spec:
      type: LoadBalancer
      ports:
      - port: 80
        targetPort: 80
        protocol: TCP
      selector:
        app: hello-pod
    With the postStart let's rewrite an NGINX's index file so we can see which pod accepted a request.
    Deploy it:
    $ kubectl apply -f deployment.yaml
    deployment.apps/hello-deploy-1 created
    deployment.apps/hello-deploy-2 created
    service/hello-svc created
    Check pods:
    $ kubectl get pod -l app=hello-pod
    NAME READY STATUS RESTARTS AGE
    hello-deploy-1-dd584d88d-25rbx 1/1 Running 0 71s
    hello-deploy-1-dd584d88d-9xsng 1/1 Running 0 71s
    Currently, the Service will route all the traffic to pods from the Deployment-1:
    $ curl adb469658008c41cd92a93a7adddd235–1170089858.us-east-2.elb.amazonaws.com
    1
    
    $ curl adb469658008c41cd92a93a7adddd235–1170089858.us-east-2.elb.amazonaws.com
    1
    Now, we can update the Deployment-2 and set replicas: 1:
    $ kubectl patch deployment.v1.apps/hello-deploy-2 -p ‘{“spec”:{“replicas”: 1}}’
    deployment.apps/hello-deploy-2 patched
    We’ve got the pods running with the same label app=hello-pod:
    $ kubectl get pod -l app=hello-pod
    NAME READY STATUS RESTARTS AGE
    hello-deploy-1-dd584d88d-25rbx 1/1 Running 0 3m2s
    hello-deploy-1-dd584d88d-9xsng 1/1 Running 0 3m2s
    hello-deploy-2-d6c989569-x2lsb 1/1 Running 0 6s
    And our Service will route 70% of the traffic to pods from the Deployment-1, and the rest to the pods from the Deployment-2:
    $ curl adb***858.us-east-2.elb.amazonaws.com
    1
    $ curl adb***858.us-east-2.elb.amazonaws.com
    1
    $ curl adb***858.us-east-2.elb.amazonaws.com
    1
    $ curl adb***858.us-east-2.elb.amazonaws.com
    1
    $ curl adb***858.us-east-2.elb.amazonaws.com
    1
    $ curl adb***858.us-east-2.elb.amazonaws.com
    1
    $ curl adb***858.us-east-2.elb.amazonaws.com
    2
    $ curl adb***858.us-east-2.elb.amazonaws.com
    1
    $ curl adb***858.us-east-2.elb.amazonaws.com
    2
    After we will check that version 2.0 is working and have no errors, we can delete the old version and scale up the new one to 2 pods.
    Kubernetes Blue/Green Deployment
    Also, in the same way, we can create a kind of blue-green deployment when we have an old (green) version, and a new (blue) version, but all traffic will be sent to the new. If we will get errors on the new version, we can easily swatch it back to the previous version.
    To do so, let’s update the .spec.selector field of the Service to chose pods only from the first, "green", deployment by using the label version:
    ...
      selector:
        app: hello-pod
        version: "1.0"
    Redeploy and check:
    $ curl adb***858.us-east-2.elb.amazonaws.com
    1
    $ curl adb***858.us-east-2.elb.amazonaws.com
    1
    Now, change the selector to the version: 2 to switch traffic to the "blue" version:
    $ kubectl patch services/hello-svc -p ‘{“spec”:{“selector”:{“version”: “2.0”}}}’
    service/hello-svc patched
    Check it:
    $ curl adb***858.us-east-2.elb.amazonaws.com
    2
    $ curl adb***858.us-east-2.elb.amazonaws.com
    2
    After everything is working, we can drop the old version and the “blue” one will become “green”.
    When using Canary and Blue-Green deployments with the solutions described above, we’ve got a bunch of issues: need to manage various Deployments, check their versions and statutes, check for errors, etc.
    Instead, we can do the same with Istio or ArgoCD.
    Istio will be discussed later, and at this time let’s take a look at how this can be done with ArgoCD.
    Deployment and ReplicaSet
    Before going forward, let’s see how Deployment and updates are working in Kubernetes.
    So, Deployment is a Kubernetes type where we can describe a template to create new pods.
    After creating such a Deployment, under the hood, it will create a ReplicaSet object which manages pods from this Deployment.
    During a Deployment update, it will create another ReplicaSet with a new configuration, and this ReplicaSet in its turn will create new pods:
    Each pod created by a Deployment has a ReplicaSet link, and this ReplicaSet has a link to a corresponding Deployment.
    Check the pod:
    $ kubectl describe pod hello-deploy-d6c989569–96gqc
    Name: hello-deploy-d6c989569–96gqc
    Labels: app=hello-pod
    Controlled By: ReplicaSet/hello-deploy-d6c989569
    This pod is Controlled By: ReplicaSet/hello-deploy-d6c989569, check this ReplicaSet:
    $ kubectl describe replicaset hello-deploy-d6c989569
    Controlled By: Deployment/hello-deploy
    
    Here is our Deployment — Controlled By: Deployment/hello-deploy.
    And the ReplicaSet template for pods is just the content of the spec.template of its Deployment:
    $ kubectl describe replicaset hello-deploy-2–8878b4b
    Pod Template:
    Labels: app=hello-pod
    pod-template-hash=8878b4b
    version=2.0
    Containers:
    hello-pod:
    Image: nginxdemos/hello
    Port: 80/TCP
    Host Port: 0/TCP
    Environment: <none>
    Mounts: <none>
    Volumes: <none>
    Events: <none>
    Now, let’s go to the Argo Rollouts.
    Argo Rollouts
    Argo Rollouts is another Kubernetes Controller and a set of Kubernetes Custom Resource Definitions, that together allow creating more complicated deployments to Kubernetes.
    it can be used alone or can be integrated with Ingress Controllers such as NGINX and AWS ALB Controller, or with various Service Mesh solutions like Istio.
    During a deployment, Argo Rollouts can perform checks of the new application’s version and run rollback in case of issues.
    To use Argo Rollouts instead of Deployment we will create a new type -  Rollout, where in the spec.strategy a deployment type and parameters will be defined, for example:
    ...
    spec:
      replicas: 5
      strategy:
        canary:
          steps:
          - setWeight: 20
    ...
    The rest of its fields are the same as the common Kubernetes Deployment.
    In the same way as Deployment, Rollout uses ReplicaSet to spin up new pods.
    During this, after installing Argo Rollouts you still can use a standard Deployment with their spec.strategy and new Rollout. Also, you can easily migrate existing Deployments to Rollouts, see Convert Deployment to Rollout.
    Install Argo Rollouts
    Create a dedicated Namespace:
    $ kubectl create namespace argo-rollouts
    namespace/argo-rollouts created
    Deploy necessary Kubernetes CRD, ServiceAccount, ClusterRoles, and Deployment from the manifest file:
    $ kubectl apply -n argo-rollouts -f [https://raw.githubusercontent.com/argoproj/argo-rollouts/stable/manifests/install.yaml](https://raw.githubusercontent.com/argoproj/argo-rollouts/stable/manifests/install.yaml)
    Later, when we will install it in Production, the Argo Rollouts Helm chart can be used.
    Check a pod — it’s the Argo Rollouts controller:
    $ kubectl -n argo-rollouts get pod
    NAME READY STATUS RESTARTS AGE
    argo-rollouts-6ffd56b9d6–7h65n 1/1 Running 0 30s
    kubectl plugin
    Install a plugin for the kubectl:
    $ curl -LO [https://github.com/argoproj/argo-rollouts/releases/latest/download/kubectl-argo-rollouts-linux-amd64](https://github.com/argoproj/argo-rollouts/releases/latest/download/kubectl-argo-rollouts-linux-amd64)
    chmod +x ./kubectl-argo-rollouts-linux-amd64
    $ sudo mv ./kubectl-argo-rollouts-linux-amd64 /usr/local/bin/kubectl-argo-rollouts
    Check it:
    $ kubectl argo rollouts version
    kubectl-argo-rollouts: v1.0.0+912d3ac
    BuildDate: 2021–05–19T23:56:53Z
    GitCommit: 912d3ac0097a5fc24932ceee532aa18bcc79944d
    GitTreeState: clean
    GoVersion: go1.16.3
    Compiler: gc
    Platform: linux/amd64
    An application’s deploy
    Deploy a test application:
    $ kubectl apply -f [https://raw.githubusercontent.com/argoproj/argo-rollouts/master/docs/getting-started/basic/rollout.yaml](https://raw.githubusercontent.com/argoproj/argo-rollouts/master/docs/getting-started/basic/rollout.yaml)
    rollout.argoproj.io/rollouts-demo created
    Check it:
    $ kubectl get rollouts rollouts-demo -o yaml
    apiVersion: argoproj.io/v1alpha1
    kind: Rollout
    spec:
    replicas: 5
    revisionHistoryLimit: 2
    selector:
    matchLabels:
    app: rollouts-demo
    strategy:
    canary:
    steps:
    - setWeight: 20
    - pause: {}
    - setWeight: 40
    - pause:
    duration: 10
    - setWeight: 60
    - pause:
    duration: 10
    - setWeight: 80
    - pause:
    duration: 10
    template:
    metadata:
    creationTimestamp: null
    labels:
    app: rollouts-demo
    spec:
    containers:
    - image: argoproj/rollouts-demo:blue
    name: rollouts-demo
    ports:
    - containerPort: 8080
    name: http
    protocol: TCP
    
    Here, in the spec.strategy the Canary deployment type is used, where in a set of steps will be performed an upgrade of the pods: first, 20% of exiting pods will be replaced with the new version, then a pause to check if they are working, then update 40%, pause again, and so on until all pods will be upgraded.
    By using the plugin installed above, we can add the --watch argument to see the upgrade process in real-time:
    $ kubectl argo rollouts get rollout rollouts-demo — watch
    Install a test Service:
    $ kubectl apply -f [https://raw.githubusercontent.com/argoproj/argo-rollouts/master/docs/getting-started/basic/service.yaml](https://raw.githubusercontent.com/argoproj/argo-rollouts/master/docs/getting-started/basic/service.yaml)
    service/rollouts-demo created
    And make an update by setting a new image version:
    $ kubectl argo rollouts set image rollouts-demo rollouts-demo=argoproj/rollouts-demo:yellow
    Check the progress:
    Done.

    21

    This website collects cookies to deliver better user experience

    Kubernetes: Deployment Strategies types, and Argo Rollouts