Implement Halt and Catch Fire #529
Labels
No Label
0.2.0
0.3.0
0.4.0
0.5.0
0.5.1
0.6.0
0.6.1
0.7.0
0.8.0
0.9.0
1.0.0
1.1.0
1.10.0
1.10.1
1.10.2
1.10a2
1.11.0
1.12.0
1.12.1
1.13.0
1.14.0
1.15.0
1.15.1
1.2.0
1.3.0
1.4.1
1.5.0
1.6.0
1.6.1
1.7.0
1.7.1
1.7β
1.8.0
1.8.1
1.8.2
1.8.3
1.8β
1.9.0
1.9.0-s3branch
1.9.0a1
1.9.0a2
1.9.0b1
1.9.1
1.9.2
1.9.2a1
LeastAuthority.com automation
blocker
cannot reproduce
cloud-branch
code
code-dirnodes
code-encoding
code-frontend
code-frontend-cli
code-frontend-ftp-sftp
code-frontend-magic-folder
code-frontend-web
code-mutable
code-network
code-nodeadmin
code-peerselection
code-storage
contrib
critical
defect
dev-infrastructure
documentation
duplicate
enhancement
fixed
invalid
major
minor
n/a
normal
operational
packaging
somebody else's problem
supercritical
task
trivial
unknown
was already fixed
website
wontfix
worksforme
No Milestone
No Assignees
3 Participants
Notifications
Due Date
No due date set.
Reference: tahoe-lafs/trac-2024-07-25#529
Loading…
Reference in New Issue
Block a user
No description provided.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
There have been a few cases lately where nodes have been in some impaired state, but still responding (if badly) to network requests. This caused other components of the system to block.
If in these conditions we instead stopped responding to network requests, the rest of the system would just ignore the wounded node and move on.
In particular, the recent webapi3 issue would have been invisible to users if the webapi node stopped responding to http. Then the balancer would have marked it as failed and moved on.
Same with the prodtahoe7 meltdown.
I acknowledge that deciding when to catch fire is non-trivial, so I'm filing this more to provoke conversation than to request any specific behavior.
Zandr and I were just talking about this one. The basic idea is that it would
be nice if an HTTP load-balancer (which is sitting in front of a farm of
webapi nodes) could cheaply detect that a given webapi node was not in a good
state, and switch traffic to other nodes instead.
To begin with, we could define what it means to be in good state. We could
put a bit of code inside the node, maybe
client.is_fully_functional()
,with some configurable criteria, maybe one or more of the following:
Then, we could define how we want the webapi interface to behave when these
criteria are not met, one of:
The first (stop listening entirely) is most useful for the load balancer,
because these devices typically assume that if a server responds at all, then
it will be able to respond correctly. It would, however, make it difficult
for us to solve the problem, since many of the diagnostic tools we would use
are themselves pages in the webapi. Any of the other options would improve
diagnosability, but would obligate the load-balancer to either look more
carefully at the response (start diverting traffic when it sees 500 Internal
Server Errors coming back, or use special probe requests to hit the status
URL on a periodic basis).
We also kicked around the idea of having two webapi ports, one which turns
itself off if the node were not fully functional, and a second which stays on
all the time. With this sort of scheme, the load-balancer could point at the
first port, and we'd use the second port for diagnostics.
A tangentially-related issue is that sometimes the node can appear to start,
'tahoe start' returns with success, but the node is in fact impaired in some
fatal way. I believe that a node which is unable to open the webapi listening
port will exhibit this behavior. I think there was a change to node startup
recently (the implementation of 'tahoe start') which makes this troublesome,
in which the bind() call is taking place after the fork(), whereas it used to
be before the fork(). #602 and #71 probably relate to this one, as well as
#371.
See #912 for a request that when the node knows that it is failing it sends out an alert.