Skip to content

Commit caa123e

Browse files
author
Ryan Lymburner
authored
Update FAQ with: "How do I prevent 503 errors during deployments?" (#819)
1 parent 4e4f33c commit caa123e

File tree

1 file changed

+5
-1
lines changed

1 file changed

+5
-1
lines changed

docs/faq.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,4 +20,8 @@ AWS Gateway API Controller supports Gateway API CRD bundle versions `v1.1` or gr
2020

2121
**How do health checks work in multi-cluster deployments?**
2222

23-
In multi-cluster deployments, when you apply a TargetGroupPolicy to a ServiceExport, the health check configuration is automatically propagated to all target groups across all clusters that participate in the service mesh. This ensures consistent health monitoring behavior regardless of which cluster contains the route resource.
23+
In multi-cluster deployments, when you apply a TargetGroupPolicy to a ServiceExport, the health check configuration is automatically propagated to all target groups across all clusters that participate in the service mesh. This ensures consistent health monitoring behavior regardless of which cluster contains the route resource.
24+
25+
**How do I prevent 503 errors during deployments?**
26+
27+
When using AWS Gateway API Controller with EKS, customers may experience 503 errors during deployments due to a timing gap between pod termination and VPC Lattice configuration propagation, which affects the time controller takes to deregister a terminating pod. We recommend setting `terminationGracePeriod` to at least 150 seconds and implementing a preStop hook that has a sleep of 60 seconds (but no more than the `terminationGracePeriod`). For optimal performance, also consider setting `ROUTE_MAX_CONCURRENT_RECONCILES` to 10 which further accelerates the pod deregistration process, regardless of the number of targets.

0 commit comments

Comments
 (0)