Skip to content

Commit 4ea9d6d

Browse files
committed
mention HA
On-behalf-of: @SAP [email protected]
1 parent 290143a commit 4ea9d6d

File tree

1 file changed

+14
-0
lines changed

1 file changed

+14
-0
lines changed

docs/content/setup/production.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,13 @@ When running etcd inside Kubernetes, an operator can greatly help in running etc
3131
operations tasks and the entire etcd lifecycle. Etcd clusters managed by Etcd Druid can be seamlessly
3232
used with kcp.
3333

34+
### High Availability
35+
36+
Care should be taken to distribute the etcd pods across availability zones and/or different nodes.
37+
This ensures that node failure will not immediately bring down an entire etcd cluster. Please refer
38+
to the [Etcd Druid documentation](https://gardener.github.io/etcd-druid/proposals/01-multi-node-etcd-clusters.html?h=affinity#high-availability)
39+
for more details and configuration examples.
40+
3441
### TLS
3542

3643
It is highly recommended to enable TLS in etcd to encrypt traffic in-transtit between kcp and etcd.
@@ -109,6 +116,13 @@ It's therefore recommended to start with a sharded setup instead of working with
109116
only. This not only improves realiability and performance, but can also help ensure newly developed
110117
kcp client software does not by accident make false assumptions about sharding.
111118

119+
### High Availability
120+
121+
To improve resilience against node failures, it is strongly recommended to not just spread the
122+
workload across multiple shards, but also to ensure that shard pods are distributed across nodes or
123+
availability zones. The same advice for etcd applies to kcp as well: Use anti-affinities to ensure
124+
pods are scheduled properly.
125+
112126
### Backups
113127

114128
All kcp data is stored in etcd, there is no need to perform a dedicated kcp backup.

0 commit comments

Comments
 (0)