launchpad-dev team mailing list archive
-
launchpad-dev team
-
Mailing list archive
-
Message #07304
Re: micro services: HTTP authentication in the datacentre and default protocol.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
...
> Its doable, but AFAIK:
> - none of the Canonical deployments have this aspect live
> - its susceptible to split brain fail
>
> So I think we'd need to invest considerably more resources to get a
> resilient HA rabbit. We may want to do that in the medium term, but
> /many/ of our initial use cases for rabbit are primarily event
> raising. So I think we can get some early benefit, and make per-case
> risk assessments for use of its persistence features in the short
> term.
>
> Anecdata: twitter, who run kestrel as their queueing system simply
> design their code to gracefully deal with a queue server going awol
> (be that crash, boom, whatever).
>
> -Rob
How much of HA is because you expect Rabbit to die, and how much of HA
is because you want a way to deploy without taking down the whole
system? Clustering seems like it would handle the second case. One
node's queue is temporarily offline until it is brought back up, but the
other nodes keep serving. And if you stop accepting new entries while
you are shutting down, then you never have any messages delayed.
If it is that you want to plan for Rabbit (or the machine it is running
on) to fail non-deterministically, then certainly you need different
security guarantees.
However, isn't the current Postgres master a "if it goes down we all go
down for a while" setup? Isn't that machine pretty reliable overall? (It
certainly also suffers from "we can't softly shut-down for upgrades",
but it seems like the non-deterministic failures are pretty reasonable.)
John
=:->
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (Cygwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
iEYEARECAAYFAk3uCOoACgkQJdeBCYSNAANmwQCgv4is2PL92qh+JdTEgfq8M9Gg
5TwAoIYaj3ZuFA/N9CT+vIbKbE2dpSAg
=lTpx
-----END PGP SIGNATURE-----
Follow ups
References