Good to know thank you. Why I'm thinking on consul, the user would just request the
endpoint from consul, so I can remove the single load balancer bottleneck, they would go
directly to rgw.
________________________________
From: Janne Johansson <icepic.dz(a)gmail.com>
Sent: Tuesday, October 6, 2020 1:52 PM
To: Szabo, Istvan (Agoda)
Cc: ceph-users(a)ceph.io
Subject: Re: [ceph-users] Consul as load balancer
Email received from outside the company. If in doubt don't click links nor open
attachments!
________________________________
Den tis 6 okt. 2020 kl 08:37 skrev Szabo, Istvan (Agoda)
<Istvan.Szabo@agoda.com<mailto:Istvan.Szabo@agoda.com>>:
Hi,
Is there anybody tried consul as a load balancer?
Any experience?
For rgw, load balancing is quite simple, and I guess almost any LB would work.
The only major thing we have hit is that for AWS4 auth, you need to make sure that the
requests to the backends* actually use the hostname sent by the client, but apart from
that, I can't think of a LB that can handle http(s) that would not work for S3/RGW.
*) some LBs, when they see a pool of backends as a list of ips like 10.1.2.1, 10.1.2.2,
10.1.2.3 will make the inner request against
http://10.1.2.3:80 instead of
http://mybucket.s3.example.com and since the request hostname is a part of the hash used
for auth, the rgw will calculate it against 10.1.2.3 but the client will of course use
mybucket.s3.example.com<http://mybucket.s3.example.com>.
--
May the most significant bit of your life be positive.
________________________________
This message is confidential and is for the sole use of the intended recipient(s). It may
also be privileged or otherwise protected by copyright or other legal rules. If you have
received it by mistake please let us know by reply email and delete it from your system.
It is prohibited to copy this message or disclose its content to anyone. Any
confidentiality or privilege is not waived or lost by any mistaken delivery or
unauthorized disclosure of the message. All messages sent to and from Agoda may be
monitored to ensure compliance with company policies, to protect the company's
interests and to remove potential malware. Electronic messages may be intercepted,
amended, lost or deleted, or contain viruses.